Help Net Security
Palo Alto Networks to acquire Cyvera
Palo Alto Networks announced a definitive agreement to acquire Cyvera, a privately held cybersecurity company located in Tel-Aviv, Israel. Under the terms of the agreement, …
New non-profit against cyber crime launches
Experts and companies in the information security industry formed the Secure Domain Foundation (SDF), a non-profit, community-driven organization devoted to the identification …
February spam highlights
Kaspersky Lab found that many malicious attachments in February’s spam came in emails allegedly sent by women who wanted to make new friends in the run-up to …
Week in review: NSA records a country’s phone calls, SSL innovations, and (IN)SECURE Magazine special issue
Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos, interviews, and articles: US announces transition of oversight over …
IBM launches new software and consulting services
IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …
Webcast: Beware of the Wild Wild Web
The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …
Risks and opportunities of personal data, privacy, and trust
The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …
Product pitch: DigiCert Certificate Inspector
SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …
Operation dismantles child exploitation enterprise on Tor network
DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Edward Snowden: Here’s how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …
The Internet of Things will transform the data center
The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …
Featured news
Sponsored
Don't miss
- CrowdStrike engages external experts, details causes of massive outage
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner