Help Net Security
Proprietary platforms to cause complexity in 2013
Citrix predicts that the rise of consumerisation and the Bring-Your-Own (BYO) phenomenon will force IT departments to focus on the challenge of apps and data governance. 2012 …
Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
Motives behind IT budget spend and 2013 cloud trends
A global survey of 550 CIOs, IT Directors, and senior IT managers has confirmed motives behind their IT budget spend in 2012, while revealing the rate of cloud adoption in …
Wi-Fi operating system ArrayOS gets new features
Wick Hill announced a new release of the ArrayOS operating system for Xirrus Wireless Arrays. Xirrus AOS 6.3 provides an advanced Wi-Fi operating system for optimizing the …
DataMotion unveils SecureMail Gateway
DataMotion announced updated its SecureMail Gateway, an intelligent monitoring solution that uses policy-based encryption and Exact Matching functionality to prevent data …
Damballa updates its cyber threat solution
Damballa unveiled Damballa Failsafe 5.1, a cyber threat solution for corporate networks. It includes features that reduce the workload of over-tasked incident response teams, …
Week in review: Inadequate AV solutions, Eurograbber attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Security experts debate moving critical infrastructure online Paul Simmonds, …
Metasploit Pro 4.5 released
Rapid7 released a new version of Metasploit Pro, which introduces advanced capabilities to simulate social engineering attacks. With Metasploit 4.5, security professionals can …
Password handling: challenges, costs, and current behavior
Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the …
Microsoft to release five critical bulletins
Microsoft Security Bulletin Advance Notification for December 2012 contains seven bulletins; five critical and two important. Bulletin 1 adversely affects Internet Explorer 9 …
Cloud-based services revenue to increase
Cloud-based services revenue in two years is expected to comprise nearly twice its current share of provider revenue, even as providers believe that showing evidence of cost …
Identity and access management with MyAccessLive
Aveksa announced MyAccessLive, a SaaS Identity and Access Management solution. This new offering provides integrated visibility and control of both cloud and on-premise …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits