Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule ...
Tags: Computer Products, software
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization. The announcement came during ...
Tags: Rapid 7, software, Computer Products
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
Tripwire today said it had acquired nCircle for an undisclosed price, a deal that will meld together two longtime rivals in the security and vulnerability-management industry. Tripwire, which had been acquired by investment firm Thoma ...
Tags: Security vulnerability, nCircle, Network
Tripwire is to buy nCircle in a deal which could create one of the largest security and vulnerability management companies in the sector. Tripwire is to buy nCircle in a deal which could create one of the largest security and ...
Tags: Tripwire, nCircle, vulnerability management
Adobe has been forced to investigate reports of a zero-day security flaw in its Reader and Acrobat software that leaves users vulnerable to cyber-attacks. The exploit was discovered by researchers at network security firm FireEye, who ...
Tags: Adobe, zero-day security flaw, Reader and Acrobat software
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
A security scare for Microsoft users hit late yesterday, after vulnerability management company Rapid7's Metasploit penetration tool project discovered an Internet Explorer exploit that is said to affect all browsers earlier than IE9, and ...
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to ...
Tags: Java vulnerabilities, computers, Oracle, Flash Player, Adobe Reader
The launch of Google Maps in Apple’s App Store last week has boosted iOS 6 adoption by 29 per cent, new data reveals. When iOS 6 launched in September, many iPhone, iPad and iPod touch users decided not to update to Apple’s ...
Tags: Google Maps, IOS 6 Adoption, Computer Products, App
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
"I don't think IT realizes how much the way we live life as individuals has completely permeated the enterprise,"says Margaret Dawson,vice president of product management at Symform."This is happening whether you want it to or not." ...
Tags: Shadow IT, Symform, survey, rogue cloud use
Cloud computing is an opportunity information security professionals should not miss,according to Philippe Courtot,chairman and CEO of security company Qualys. "This is a fantastic and opportunity to sit down with the CIO and the ...
Tags: Cloud computing, Information security, Qualys, London