Help Net Security
Mobile device data visualization for field investigators
Cellebrite introduced UFED Link Analysis, a new product that allows field investigators to visualize key relationships between suspects and identify important behavior by …
Five things that the private cloud is not
Ongoing hype around private cloud computing is creating misperceptions about private cloud, according to Gartner, Inc. To help reduce the hype and identify the real value of …
Cisco delivers new security solutions
Cisco introduced a set of security solutions designed to fortify data centers against the threats they face in moving toward more consolidated and virtualized environments, …
Wave Endpoint Monitor detects anomalous behavior
Wave Systems announced Wave Endpoint Monitor (WEM), a solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM …
Structured method to data breach analysis and response
Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …
Trend Micro expands consumer mobile portfolio
Trend Micro expanded its consumer mobile offerings to secure, enhance and simplify people’s mobile lives. The new release of Trend Micro Mobile Security Personal Edition …
Web security client for OS X
Perimeter E-Security announced their cloud-based SaaS Web Security solution now supports OS X. The solution allows organizations to enforce acceptable use policies, reduce …
Cloud-based content management apps for the life sciences industry
Veeva Systems announced Vault Enterprise, a cloud-based suite of content management applications developed specifically for the global life sciences industry. Now, life …
Cyber security strengthened at EU institutions
EU institutions have reinforced their fight against cyber threats by establishing the EU’s Computer Emergency Response Team, or CERT-EU, on a permanent basis. This …
Full keynote lineup announced for RSA Conference Europe 2012
RSA Conference announced its complete line-up of keynote speakers for the 13th annual RSA Conference Europe, taking place from 9th -11th October 2012, at the Hilton London …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Every third computer in North America attacked while online
An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance