Help Net Security
Advanced threats to drive growth in new product segment
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …
Lucrative business: cybercrime-as-a-service
With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …
Manage security across multiple systems with Milan 3.0
Prosperoware Milan 3.0, an integrated platform for information governance, now includes a new module that helps firms move to a “need-to-know” security model. …
WebTitan Cloud: Web filtering service for SMBs
SpamTitan Technologies launched WebTitan Cloud, a scalable web content filtering service that helps businesses control Internet usage. It allows organizations to create …
Week in review: NSA privacy violations, key cloud computing trends, and building security culture
Here’s an overview of some of last week’s most interesting news, videos, interviews, reviews and articles: Can biometrics revolutionize mobile payment security? …
Is the hybrid cloud the future for enterprises?
While the public cloud remains important to IT decision-makers at UK and US enterprises, the limitations of using this type of platform as a one-size-fits-all solution are …
Panda Security launches 2014 retail line
Panda Security launched Panda Global Protection 2014, Panda Internet Security 2014 and Panda Antivirus Pro 2014. Designed to provide complete protection with minimum impact on …
Turn any iOS device into a secure mobile payment solution
SecureNet Payment Systems launched Mobile PayOS, the latest in mobile payment technology empowering merchants of all sizes to turn any iOS mobile device into a secure mobile …
Securing the modern web: Open sourcing the future of IAM
Every CIO needs a reliable identity and access management (IAM) system for protecting employee, customer, and partner data – and for years, they have relied on …
Where RFI attacks fall in the security threat landscape
New research from Incapsula yielded a few interesting facts about RFI attacks. The data for the report was collected by monitoring billions of web sessions over a 6-month …
What to expect with PCI DSS 3.0
The PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) 3.0 change highlights, as a …
Secure rugged Android tablet for the government
Becrypt announced a new technology partnership with Getac to provide the first secure Android tablet solution suitable for military, defence and government and wider public …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated