Help Net Security
Safeguard Facebook photos with McAfee Social Protection
McAfee announced the availability of a free public beta of McAfee Social Protection, a new app for Facebook that protects users’ photos from being shared without their …
BYOD is not for every company, or every employee
The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …
iAlertTag wirelessly secures, alerts, and locates your iPhone
Cirago International released its new iAlertTag (IAT1000), a solution for finding a lost iPhone, keeping an iPhone close by or locking your Windows laptop. iAlertTag creates a …
Intel partners with VMware for cloud security
Although companies are expanding their use of cloud computing to realize improved agility and efficiencies, concerns about security remains a top barrier to adoption. Intel …
Kingston unveils new enterprise-class SSD
Kingston Digital announced the SSDNow E100 SSD, a new SSD which enables enterprises to accommodate the performance demands required in support of big data and virtualization …
Mikko Hypponen: Where are we and where are we going
Mikko Hypponen is the Chief Research Officer at F-Secure. Here you can watch his keynote at this year’s Hack In Paris conference.
Data protection for the cloud with ProtectV
As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the …
Cyber incident reporting in the EU
ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …
Smart Grid Infrastructure & Networking
With contributions from more than 30 experts, Smart Grid Infrastructure & Networking describes cutting-edge technologies for connecting the electrical power …
Week in review: Multi-platform malware, new trends in BYOD, and Google setting up privacy team
Here’s an overview of some of last week’s most interesting news, articles and reviews: 92% of the top 100 mobile apps have been hacked Ninety-two percent of the …
Proactive or reactive: Should that be the question?
For a number of years digital forensics has referred to “the application of computer investigation and analysis techniques to gather evidence suitable for presentation …
Safe Money technology protects online purchases
It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance