
Fortify gives thumbs up to SANS Institute-led request for more secure code development practices
17 February 2010 by
Security Expert Releases New Linux Distribution for Ethical Hacking and Penetration Testing; Introducing the Live Hacking CD
13 February 2010 by Marc Jacob
Common Assurance Metric – Beyond the Cloud
8 February 2010 by Marc Jacob
Cloud computing creates a new legal ballgame: But who will solve the legal issues on this important new technology?
8 February 2010 by Marc Jacob
Call centres risk losing customers as complaints go unrecognised, says survey
8 February 2010 by Marc Jacob
ENISA: 17 golden rules to combat online risks and for safer surfing mobile social networks
8 February 2010 by ENISA
Corporate Departments Left Open to Voice Call Interception despite Being “Prime Targets”
4 February 2010 by
Mimecast: 70 Percent of Companies Using Cloud-Based Services Plan to Move Additional Applications to the Cloud in the Next 12 Months
4 February 2010 by Mimecast
St Albans council report on four stolen laptops highlights need for multiple layers of security on data in transit
4 February 2010 by Origin Storage
3PAR: Thin provisionning Tops storage management heat index
1 February 2010 by 3PAR
HMRC tax return phishing twice as likely to defraud users
1 February 2010 by Marc Jacob
Security Experts Report No One Stepped Up To Claim $250k in Pure Gold
1 February 2010 by Marc Jacob
Origin says Data Privacy Day report highlights need for encryption
29 January 2010 by Origin Storage
Data Privacy Day: New Report Reveals Companies Struggle to Manage Electronic Records
28 January 2010 by Iron Mountain Digital
AFCDP: Access Right Index 2010
28 January 2010 by AFCDP
UK Security Breach Investigations Report 2010 Published
26 January 2010 by
CRYPTOCard survey: 80% of businesses recognise changing security risks as adoption of cloud-based IT solutions increases, yet most have yet to respond effectively
25 January 2010 by CRYPTOCard
RSA global survey reveals confidence in social networking security shaken as online crime risk
21 January 2010 by RSA, La Division Sécurité d’EMC
Check Point Global Survey Reveals Rise In Unprotected Enterprise Endpoints
13 January 2010 by Marc Jacob
Symantec 2010 State of the Data Center Study Shows Mid-Sized Enterprises Emerging as Data Center Vanguards
11 January 2010 by Symantec
New RSA executive research unveils strategies for closing CISO-CEO GAP
5 January 2010 by RSA, La Division Sécurité d’EMC
Origin says MBNA laptop fiasco could easily have been avoided
23 December 2009 by Origin
Survey Finds Firms Use Unsecure Technology For Transferring Critical Information
16 December 2009 by Cyber-Ark
The Logic Group: Mobile technologies and customer behaviour analytics to be key priorities for Payments Industry over the next few years
15 December 2009 by Marc Jacob
Live Hacking Book Sees Strong Sales on Amazon.com; New Distribution Channels to Open Before the End of the Year
14 December 2009 by Marc Jacob
Credant says MoD laptop theft highlights dangers of lax crypto security
14 December 2009 by Credant Technologies
100% of Organizations Have Security and Compliance Breaches
14 December 2009 by PROMISEC
Daniel Ventre: "Information Warfare", new book
3 December 2009 by Marc Jacob
BridgeHead Software delivers Enterprise Imaging solution
3 December 2009 by Marc Jacob
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts