Help Net Security
Cenzic Enterprise integrates with F5 BIG-IP ASM
Cenzic announced the direct API integration of the Cenzic Enterprise 7.0 suite of products with F5’s BIG-IP Application Security Manager(ASM) 11.3. With this combined …
Check Point introduces high-performance data center security appliance
Check Point launched its new 21700 Appliance with 78 Gbps of firewall throughput, 25 Gbps of IPS throughput and a 2,922 SecurityPower unit (SPU) rating. Security gateways must …
$400 million risk lurking inside global enterprises
Ponemon Institute and Venafi announced a new report provides an extensive examination of how failure to control trust in the face of new and evolving security threats places …
12.6 million identity fraud victims identified in the U.S.
In 2012 identity fraud incidents increased by more than one million victims and fraudsters stole more than $21 billion, the highest amount since 2009, according to Javelin …
How CSOs are enabling secure BYOD
Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …
Tips to overcome PHI security obstacles
Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …
SmishGuru simulated attack service launches
Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …
Alert Logic releases new log manager
Alert Logic announced a new release of Log Manager which enables real-time security monitoring of critical security logs. By combining correlation with on-the-fly parsing of …
Qualys CEO to address security in a hyperconnected world at RSA Conference 2013
Qualys Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference 2013. Courtot’s keynote, which …
Security pros should listen with their heads, not their hearts
There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …
The sophistication of risky apps, mobile misbehavior and spyware
McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …
F5 Networks releases hybrid cloud solution for mobile application management
F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …