Help Net Security
Citrix releases NetScaler Control Center for VMware
Citrix announced Citrix NetScaler Control Center for VMware. Citrix is automating deployment and configuration of NetScaler functionality within networks that will use the new …
Red Hat Certificate of Expertise released
Red Hat announced continued momentum for Red Hat Cloud Infrastructure, including a new performance benchmark, the introduction of the Red Hat Certificate of Expertise in …
Kingston introduces new enterprise SSD
Kingston Digital announced the SSDNow E50, its latest enterprise-class SSD. It allows companies to take advantage of enterprise-level SSD performance for tasks such as data …
PHDVirtual releases virtual backup and disaster recovery software
PHD Virtual Technologies announced the availability of several new products including PHD Virtual Backup 6.5, which provides methods of virtual and cloud-based data protection …
There are no winners in the blame game
Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of …
First Round of HITBSecConf Kuala Lumpur speakers announced
Here’s a taste of some presentations you can expect at HITBSecConf Malaysia in October. You can register here. Conference speakers Collin Mulliner (Researcher, Systems …
WatchGuard partners with NCP engineering for IPsec VPN access
WatchGuard announced a partnership with NCP engineering to simplify IPsec VPN access for Microsoft Windows and Apple OS X users. NCP’s remote access VPN technology is …
Week in review: Cybercrime-as-a-service, Groklaw shutdown, WIn8 unfit for govt computers
Here’s an overview of some of last week’s most interesting news, reviews and articles: Lucrative business: cybercrime-as-a-service With the rise of cloud …
How encryption and tokenization help with cloud services adoption
Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …
Fingerprint algorithm for Android devices
Precise Biometrics AB has launched a new software product designed and optimized for embedding fingerprint verification on smartphones and tablets. Precise BioMatch Mobile …
Disaster recovery for public, private and hybrid clouds
Zerto announced Zerto Virtual Replication (ZVR) 3.0, a disaster recovery solution built for public, private and hybrid clouds. It includes new functionality for effective …
Mobile security management market to hit billion dollar mark
The Mobile Security Management (MSM) market is emerging as a strong, fledgling submarket of Enterprise Mobility Management (EMM). As Mobile Device Management (MDM) evolves …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits