Help Net Security
IS Decisions releases FileAudit 4
IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and …
Citrix introduces XenMobile MDM
Citrix announced XenMobile MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance …
Malicious URLs eclipsing botnets as malware distribution leader
McAfee Labs revealed that sophisticated attacks originally targeting the financial services industry are now increasingly directed at other critical sectors of the economy, …
25% of DDoS attacks in 2013 will be application-based
Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …
Security is top reason why IT adopts single sign-on
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …
FireMon expands situational awareness with Security Manager 7.0
FireMon announced new capabilities in Security Manager 7.0 that improve organizational ability to identify, understand and manage changes in security posture – in …
Cenzic Enterprise integrates with F5 BIG-IP ASM
Cenzic announced the direct API integration of the Cenzic Enterprise 7.0 suite of products with F5’s BIG-IP Application Security Manager(ASM) 11.3. With this combined …
Check Point introduces high-performance data center security appliance
Check Point launched its new 21700 Appliance with 78 Gbps of firewall throughput, 25 Gbps of IPS throughput and a 2,922 SecurityPower unit (SPU) rating. Security gateways must …
$400 million risk lurking inside global enterprises
Ponemon Institute and Venafi announced a new report provides an extensive examination of how failure to control trust in the face of new and evolving security threats places …
12.6 million identity fraud victims identified in the U.S.
In 2012 identity fraud incidents increased by more than one million victims and fraudsters stole more than $21 billion, the highest amount since 2009, according to Javelin …
How CSOs are enabling secure BYOD
Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …
Tips to overcome PHI security obstacles
Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …
Featured news
Resources
Don't miss
- Nodepass: Open-source TCP/UDP tunneling solution
- Why cybersecurity hiring feels so hard right now
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules