Help Net Security
HP delivers server for Big Data
HP unveiled a server built to help clients operationalize Big Data, drive new business opportunities and save up to $1 million over three years. With the advent of Big Data …
ManageEngine updates Password Manager Pro
ManageEngine announced enhancements to Password Manager Pro, which offers protection to data centres by helping establish access controls to IT infrastructure, and seamlessly …
Windows 8 Inside Out
You’re beyond the basics—so dive right into Windows 8 and really put your PC to work! Windows 8 Inside Out is an organized reference packed with hundreds of timesaving …
Trojanized Thanksgiving-themed screensavers lurking online
If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things …
Understanding basic honeypot concepts
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …
Cyber Monday safety tips
AVG Technologies announces five tips to help consumers ensure secure online shopping. Whether from desktops, laptops, tablets or smartphones, these tips help consumers make …
Imation releases PC on a Stick mobile workspace
Imation announced beta availability of its IronKey Workspace, certified for deployment of Windows To Go. The IronKey Workspace lets organisations outfit mobile professionals …
New line of Panda Security integrated perimeter security appliances
Panda Security launched Panda GateDefender Performa eSeries, its new, unified perimeter security device that protects against all types of threats. The solution is available …
VMware vCenter Multi-Hypervisor Manager 1.0 released
VMware vCenter Multi-Hypervisor Manager is a component that enables support for heterogeneous hypervisors in VMware vCenter Server. It provides the following benefits to your …
Linux file encryption with BestCrypt
Jetico has announced BestCrypt Container Encryption for Linux 2.0, now with a simple user experience in a new GUI, plus greater stability and security. Features and benefits …
What’s the most coveted target for cyber attackers?
Despite repeated warnings, organizations are still failing to lock down the primary target of most cyber-attacks – privileged access points. Cyber-Ark labs analyzed a …
Tips for a safe online shopping season
The holiday season presents the perfect opportunity for cybercriminals to steal consumers’ information as shopping is increasingly conducted online. According to a 2011 …
Featured news
Resources
Don't miss
- How enterprise leaders can secure and govern agentic AI
- Background check, drug testing provider DISA suffers data breach
- China-based Silver Fox spoofs healthcare app to deliver malware
- Cybersecurity needs a leader, so let’s stop debating and start deciding
- Avoiding vendor lock-in when using managed cloud security services