Help Net Security
The anatomy of cyber security exercises
In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …
Real user monitoring for web developers
AppNeta announced Real User Monitoring (RUM) capabilities designed for web development and application performance. As a key feature of AppNeta’s TraceView application …
Steganos Privacy Suite 14 released
The newly released Steganos Privacy Suite 14 is designed for individuals who want privacy protection for their data and Internet activities – including on their …
Microsoft releases Windows 8
Microsoft today announced the global availability of Windows 8. Beginning Friday, Oct. 26, consumers and businesses worldwide will be able to experience all that Windows 8 has …
Video: Bill Gates on Windows 8, Windows Phone 8 and Surface
Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.
Banker pleads guilty to sharing personal information of account-holders
LeRoy Brown, a former personal banker from Washington, D.C., pled guilty to conspiracy to commit bank fraud for his role in an identity theft scheme involving $121,400 in …
New cybercrime monetization methods
AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …
Worst passwords of 2012
Just in time for Halloween comes something that might scare anyone who spends a lot of time online: SplashData’s annual list of the most common passwords used on the …
Phishing websites proliferate at record speed
A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that while the uptime of phishing websites dropped during the first half of 2012, …
Most effective ways to stop insider threat
Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …
Qualys extends QualysGuard Cloud Platform
Qualys announced that QualysGuard Vulnerability Management will now feature vulnerability prediction capabilities within a new dashboard and threat reports for zero-days and …
Entrust IdentityGuard delivers mobile smart credentials
To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence