Help Net Security
MS SQL Agent facilitates the collection of MSSQL audit records
SNARE for MSSQL allows a security administrator to remotely set up, control and monitor the application through a standard web browser and a self-contained installation …
Intigua: Automate the provisioning of management technologies
CIOs today are asking their IT teams to build private clouds that reflect the on-demand simplicity and agility that Amazon Web Services delivers in its public cloud. Unlike …
Microsoft releases critical fixes for IE and Exchange Server
There’s a remotely exploitable, publicly disclosed, critical remote code execution vulnerability in Microsoft Exchange (MS13-061)! But wait, is it really remotely …
Hacking a smart lightbulb system
The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …
Most government CIO budgets flat or increasing in 2013
Despite a continuing drive to lower the cost of IT services, nearly 75 percent of government IT budgets globally were reported as flat or increasing in 2013, according to the …
How much confidential info is left unprotected in SharePoint?
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and …
Protect against threats targeting Android
Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …
Fortinet expands secure application delivery product portfolio
Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …
Can biometrics revolutionize mobile payment security?
With the explosion in smartphones usage, the number of payments done via mobile devices has significantly increased over recent years. As eCommerce becomes mCommerce, the …
Adoption of antivirus software on mobile devices remains low
Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …
Week in review: Tor users targeted with spyware, secure mail providers close up shop
Here’s an overview of some of last week’s most interesting news, reviews and articles: Working as an ethical hacker The majority of people in the security industry …
Netwrix updates its configuration auditing software
Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation