Help Net Security
RSA and Bit9 team to accelerate cyber forensics investigations
Bit9 announced an agreement with RSA to integrate Bit9’s cloud-based software reputation service with RSA NetWitness Spectrum Live service. Under terms of the agreement, …
Next Level Security Systems releases new security management platform
Next Level Security Systems announced the expansion of its NLSS Gateway product suite with the introduction of the NLSS Gateway 5000, an enterprise-class unified appliance …
Web apps experience 2,700+ attacks per year
The median annual attack incidents on the 50 Web applications observed was 274 times a year, with one target experiencing more than 2,700 attack incidents. According to a new …
Join the Smart Grid Security Virtual Summit
On Thursday, August 9, Smart Grid Observer will host a full-day Smart Grid Security Virtual Summit. The event brings together a range of top utility practitioners and security …
Spam filtering tools fail short with phishing attacks
Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …
Trend Micro unleashes big data analytics
Trend Micro announced an expansion of the Trend Micro Smart Protection Network, the cloud-based security infrastructure that powers most of the company’s products and …
SignatureLink introduces all-in-one ecommerce fraud solution
Until now, ecommerce fraud solutions accomplished one objective: screen out online payment fraud based on site visitor behaviors, devices, and other criteria. The …
Alert Logic launches SaaS web application firewall
Alert Logic announced the availability of Alert Logic Web Security Manager with ActiveWatch to protect web applications against threats and attacks. The solution combines WAF …
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
Quantum cryptography theory has a proven security defect
Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …
GFI MailArchiver 2012 tackles email storage and data leakage
GFI Software announced the availability of GFI MailArchiver 2012 that offers new reporting capabilities to guard against data leakage of sensitive information, such as social …
New version of Palamida’s scanning solution for open source projects
Palamida recently announced Enterprise Edition 6, the latest edition of its open source intellectual property and vulnerability risk management product. The new version adds a …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance