Help Net Security
Total Defense launches coud security solution
Total Defense announced Total Defense for Business, a solution that combines cloud computing with the delivery of multi-layered protection through the integration of various …
Week in review: Malicious QR codes, Tor-powered botnet, and Mac users hit with SMS fraud
Here’s an overview of some of last week’s most interesting news, videos and articles: Motives behind IT budget spend and 2013 cloud trends A global survey of 550 …
Top 7 security predictions for 2013
A seismic shift in who controls the Internet? Another Mac malware outbreak? Your smart TV being highjacked for a DDoS attack? Whatever 2013 may bring, it’s sure to be an …
Many who use the cloud for work, don’t trust it for personal data
A survey by Lieberman Software revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as …
Users still have a casual attitude regarding security
A Siber Systems survey of over 700 adults from the United States, the U.K., Germany and other countries shows a significant disconnect between how individuals perceive online …
Ransomware arrests highlight online blackmail threat
Detectives from the Police Central e-Crime Unit (PCeU) arrested three people in connection with using ransomware to blackmail people. It has been alleged that computer users …
All-terrain, military-grade next generation firewall
Stonesoft announced its MIL-320 Next Generation Firewall/VPN appliance that provides military-grade network security in a rugged go-anywhere unit. The MIL-320 appliance packs …
Blue Coat delivers visibility and control for networks
Blue Coat Systems introduced new updates for Blue Coat PacketShaper appliances that enable businesses to embrace Web, cloud and mixed-use recreational applications on the …
5 cloud myths that will be debunked in 2013
There are a lot of common misconceptions and myths related to cloud computing. Many think of the cloud as less secure and reliable than on premise solutions, when in reality …
Motivations, trends and measurement of IT security spending
A new comparative survey by The Ponemon Institute explores the motivations behind IT security spending among UK and US organizations, and how industry regulations, data breach …
IT security implications of key technology trends for 2013
Automated controls are increasingly being used by organizations to manage the cost of compliance and reduce their business risk believes Turnkey Consulting. Their latest …
Most security pros want more desktop privilege control
While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days