Help Net Security
Cisco and Citrix partner on networking and cloud
Cisco and Citrix announced an expansion of their desktop virtualization partnership into three strategic areas: cloud networking, cloud orchestration, and mobile workstyles. …
Facebook partners with Panda Security
Panda Security signed a collaboration agreement with Facebook to protect users. Facebook users will be able to download a free 6-month version of Panda Internet Security 2013 …
Time to rethink network management
The acceleration in data speeds and volumes in telecom networks is increasing the need for real-time network management solutions, according to Napatech. Network probes have …
BYOD security and control fears
Enterprises are restricting employee access to vital work applications due to security and control fears, according to Ping Identity. Employees were found to use an average of …
Cloud security application uses electronic fingerprint
Intrinsic-ID launched Saturnus, an application that allows users to protect data with their mobile devices before sending it to the cloud. It is the first application that …
Oracle patches 109 vulnerabilities
Oracle’s Critical Patch Update for October 2012 patches 109 vulnerabilities across hundreds of Oracle products. There are several patches that require immediate …
Cloud-based document security from SealPath
SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …
Seagate unveils three new enterprise-class HDDs
Seagate announced three new enterprise-class hard disk drives optimized for traditional data centers and emerging cloud infrastructures. Perfect for cloud bulk data storage, …
Fortinet unveils FortiOS 5.0 operating system
Fortinet announced FortiOS 5.0, a security operating system that is the foundation for all Fortinet FortiGate integrated security platforms. This new release provides more …
Everyday Cryptography: Fundamental Principles and Applications
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …
Most people want control of information collected by data brokers
As Congress examines how data brokers collect, aggregate and share consumers’ personal information, a new survey by TrustedID shows that most people are confused about …
Multi-dimensional analytics tool for big data
LogRhythm announced the enhancement of its SIEM 2.0 Big Data security analytics platform with the industry’s first multi-dimensional behavioural analytics. Leveraging …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days