Help Net Security
25% of DDoS attacks in 2013 will be application-based
Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …
Security is top reason why IT adopts single sign-on
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …
FireMon expands situational awareness with Security Manager 7.0
FireMon announced new capabilities in Security Manager 7.0 that improve organizational ability to identify, understand and manage changes in security posture – in …
Cenzic Enterprise integrates with F5 BIG-IP ASM
Cenzic announced the direct API integration of the Cenzic Enterprise 7.0 suite of products with F5’s BIG-IP Application Security Manager(ASM) 11.3. With this combined …
Check Point introduces high-performance data center security appliance
Check Point launched its new 21700 Appliance with 78 Gbps of firewall throughput, 25 Gbps of IPS throughput and a 2,922 SecurityPower unit (SPU) rating. Security gateways must …
$400 million risk lurking inside global enterprises
Ponemon Institute and Venafi announced a new report provides an extensive examination of how failure to control trust in the face of new and evolving security threats places …
12.6 million identity fraud victims identified in the U.S.
In 2012 identity fraud incidents increased by more than one million victims and fraudsters stole more than $21 billion, the highest amount since 2009, according to Javelin …
How CSOs are enabling secure BYOD
Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …
Tips to overcome PHI security obstacles
Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …
SmishGuru simulated attack service launches
Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …
Alert Logic releases new log manager
Alert Logic announced a new release of Log Manager which enables real-time security monitoring of critical security logs. By combining correlation with on-the-fly parsing of …
Qualys CEO to address security in a hyperconnected world at RSA Conference 2013
Qualys Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference 2013. Courtot’s keynote, which …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)