Help Net Security
It takes 10 hours to identify a security breach
Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …
Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec
Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …
Secure automated archiving from Imation
Imation launched its next generation object store, the Nexsan Assureon secure automated archive solution. It brings secure automated archiving to mid-sized organizations and …
Red Hat unveils OpenStack certification and solution marketplace
Red Hat’s OpenStack Cloud Infrastructure Partner Network now boasts more than 100 global technology industry leaders as members, including Bull, Dell, Fujitsu, Hitachi, …
Week in review: Reactions to PRISM, and the question of whether or not to hack back
Here’s an overview of some of last week’s most interesting news, articles and reviews: The future of online authentication Recently, Twitter has introduced …
Automated analysis of essential security controls
EiQ Networks announced ThreatVue, an out-of-the-box security monitoring solution that automates the implementation, analysis and remediation guidance of essential security …
In-house control and encrypted voice calls
Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …
Large orgs in denial about own security breaches?
Over two thirds (66%) of large organizations said they either had not experienced a security incident in the last 12-18 months or were unsure if they had, a recent Lancope …
Americans were anxious about privacy even before NSA spying scandal
Big Brother is watching and Americans know it. New figures from the quarterly Allstate/National Journal Heartland Monitor Poll show that most Americans exhibit a healthy …
Eight charged for hacking global financial institutions
Eight alleged members of an international cybercrime, money laundering and identity theft conspiracy have been federally charged in New Jersey with a scheme to use information …
Oppose PRISM-like programs today or lose you privacy tomorrow
I used to work for a telecommunication company. The government had access to call records, although the process for obtaining any information required manual requests and …
OWASP top 10 web application risks for 2013
Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)