Help Net Security
Explore, analyze and visualize data in Hadoop
Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …
Lord Sebastian Coe to keynote RSA Conference Europe 2013
RSA Conference announced Olympic champion, politician and former chair of the 2012 Summer Olympic & Paralympic Games, Lord Sebastian Coe to its lineup of keynote speakers …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Attitudes towards data protection and encryption in the cloud
An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …
Can DDoS attackers turn mitigation devices against you?
SYN reflection attacks are one of the more sophisticated DDoS attack methods and typically require some skill to execute. However, they have recently grown in popularity as …
Mobile and cloud data risks exposed
A new Ponemon eport focuses on the risks associated with employee access to regulated data, such as protected health and financial information, via company or personal mobile …
Advanced threat detection from Cylance available for free
The Cylance PrivateDETECT for endpoints is now ready for broad beta consumption as limited time freeware. Cylance’s technological approach is to apply big math and …
SSL Labs: Deploying forward secrecy
With revelations about mass surveillance in the news everywhere, an obscure feature of SSL/TLS called forward secrecy has suddenly become very interesting. So what is it, and …
Are cyber attacks more dangerous than physical attacks?
Eighty percent of C-level executives and IT security professionals believe that cyber attacks pose a greater risk to their nation than physical attacks, while 51 percent …
Creating a cloud security policy
Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …
Firefox 22 delivers 14 security updates
Mozilla released Firefox 22, which includes 14 security updates: four are critical, six high, three moderate and one low. Fixed in this version: MFSA 2013-62 Inaccessible …
AirWatch enhances laptop management solution
AirWatch announced enhancements to its laptop management solution that provides additional functionality and platform support for organizations that need to manage all of …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down