Help Net Security
Microsoft to release nine bulletins on Tuesday
For the second month running, Microsoft’s Patch Tuesday Advanced Notification includes nine bulletins. This month, five are rated “critical’ and four …
NIST updates guide for dealing with computer security incidents
The National Institute of Standards and Technology (NIST) has published the final version of its guide for managing computer security incidents. Based on best practices from …
Performance tuning Windows Server 2012
Microsoft released a comprehensive paper that describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the …
Insight on social software and big data analytics
Teradata and Mzinga announced the results of a recent industry survey exploring the use of social technologies and big data analytics in business. The survey’s primary …
ESET updates products for OS X Mountain Lion
ESET announced that ESET Cybersecurity for Mac and ESET NOD32 Antivirus Business Edition for Mac OS X have been updated to be fully compatible with OS X Mountain Lion. These …
CISSP Study Guide, 2nd Edition
The CISSP certification is a globally-recognized, vendor neutral exam for information security professionals. The newest edition of this study guide is aligned to cover all of …
BYOD increases costs for most organizations
The results of a study by Lieberman Software Corporation confirms that BYOD (bring your own device) increases costs to businesses. Respondents were asked if they believed …
Rapid7 Nexpose introduces IPv6 discovery and scanning capabilities
Rapid7 announced that the new version of its vulnerability management solution, Rapid7 Nexpose, introduces features for discovering and scanning IPv6 assets that organizations …
6+ million malware samples created in the last 3 months
In the second quarter of 2012 alone, more than six million new malware samples were created, a similar figure to the first quarter, according to PandaLabs. The average number …
Olympics and Android hit by malware and rogue apps
GFI Software released its report of the most prevalent threat detections encountered last month. In July, GFI threat researchers observed a number of malware attacks targeting …
BYOD is overtaking the workplace, security is top concern
Across the U.S. and Europe, the majority (78 percent) of enterprise IT decision makers say that employees are already using consumer devices to conduct company business, …
Facebook Developer World HACK 2012 announced
Facebook announced the Facebook Developer World HACK 2012, a series of events hosted around the world throughout August and September. Facebook Developer HACKs are day-long …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance