Help Net Security
Network IDS reduces “white noise” for more focus on critical vulns
RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …
Spike in suspicious traffic and TOR usage, says threat report
Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …
Solving network security complexity with automation
Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …
The threat within: How SMEs can protect themselves from light-fingered staff
It hasn’t been an easy time for small businesses. Where once cybercriminals shunned SMEs in favour of larger corporates, the threat landscape has changed drastically in …
Exposing unknown threats with mathematical science
Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …
Sophos delivers cloud-based endpoint security
Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …
Microsoft details risks of running unsupported software
Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …
Women crucial for taking infosec industry to next level
Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …
When the phone call is more dangerous than malware
During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …
Secure corporate BYOD solution by ForeScout
ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …
RSA takes a big data approach to help with high-risk threats
RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …
Control system security: safety first
Every large utility, pipeline, refinery and chemical plant has a cyber security program, but most are IT-centric. Anti-virus programs, software update programs and programs of …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring