Help Net Security
App turns a mobile device into a personal authenticator
Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …
New USB flash drives from SanDisk
SanDisk announced three USB flash drives, the SanDisk Ultra USB 3.0, Cruzer Orbit and Cruzer Force USB flash drives. All three drives are ideal for secure storage, allowing …
Microsoft patches 34 vulnerabilities
We have seven bulletins from Microsoft this month, addressing a total of 34 vulnerabilities. Six of the bulletins are rated “critical” and allow for Remote Code …
Latest leaks by NSA whistleblower reveal NSA’s global reach
EU countries might be formally outraged at the US bugging of EU officials both in America and Europe and NSA’s phone surveillance in general, but as news outlets …
Identity and access management tips for proactive compliance
N8 Identity announced eight tips for proactive compliance through identity and access management (IAM) best practices. These tips offer advice to organizations seeking to …
Equifax acquires TrustedID
Equifax has acquired TrustedID, which will become part of Equifax Personal Solutions, Equifax’s direct-to-consumer business unit offering credit monitoring and identity …
Selecting a cloud provider starts with exit planning
Let’s begin with a story: The first day of the new week started very ordinarily and nothing indicated this was going to be a very long and tiring day for Sarah, a CIO of …
Audit privileged access to Microsoft Online Services
Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …
US Emergency Alerting System vulnerable to attack
IOActive has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States. They uncovered the …
Super-scalable LDAP directory driven by big data
Radiant Logic announced a commercial solution for distributed storage and processing for enterprise identity management. Based on Hadoop, this new highly-available version of …
Global security threats focus of Technology Against Crime Forum
Senior representatives from governments, law enforcement, industry, security and academia from around the world are gathering in Lyon for the first Technology Against Crime …
Workers do not trust employers with personal data
Workers using their own mobile devices for work remain fearful of their employer accessing their personal information. A new Aruba Networks report features a study of over …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)