Help Net Security
Tips to overcome PHI security obstacles
Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …
SmishGuru simulated attack service launches
Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …
Alert Logic releases new log manager
Alert Logic announced a new release of Log Manager which enables real-time security monitoring of critical security logs. By combining correlation with on-the-fly parsing of …
Qualys CEO to address security in a hyperconnected world at RSA Conference 2013
Qualys Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference 2013. Courtot’s keynote, which …
Security pros should listen with their heads, not their hearts
There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …
The sophistication of risky apps, mobile misbehavior and spyware
McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …
F5 Networks releases hybrid cloud solution for mobile application management
F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …
Duo Security launches secure mobile ID
Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …
Modeling, customizing, and automating applications with AWS OpsWorks
Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …
Virtual appliance fuels Bring Your Own Identity
NetIQ announced SocialAccess, a virtual appliance that allows business and government entities to leverage social identity providers to share select identity information for …
Antibot: Network-based botnet removal tool
Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …
Week in review: Bit9 hack, malicious applications of augmented reality, and Adobe 0-day mitigation
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Bit9 hacked, its certificates stolen and used to sign malware Bit9, …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks