Help Net Security
Open source NAC system PacketFence 3.6 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Red Hat Enterprise Linux 6 achieves top security certification
Red Hat Enterprise Linux 6, including the KVM hypervisor, has been awarded the Common Criteria Certification at Evaluation Assurance Level (EAL) 4+ – the highest level …
Privacy compliance laws: Why the European Commission finally got it right
The debate about privacy compliance has always been a heated one. Add to the mix new European Commission legislation and you have a recipe for not only a lively debate but …
Cloud Security Alliance released SIEM guidance
The Cloud Security Alliance (CSA) released the Security Information and Event Management (SIEM) guidance report as part of its Security as a Service (SecaaS) Implementation …
Service Bus for Windows Server released
Service Bus for Windows Server provides Windows Azure Service Bus messaging capabilities on Windows Server. It enables you to build, test, and run loosely-coupled, …
Privilege Guard 3.6 released
Avecto released Privilege Guard 3.6, which introduces a number of new features, including a challenge/response capability to easily authorize applications for remote users and …
Effective MySQL: Replication Techniques in Depth
Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …
Week in review: Windows 8 security features, weak crypto allowed spoofing emails from Google, PayPal domains
Here’s an overview of some of last week’s most interesting news and articles: Shortened .gov URLs lead to scams The fact that cyber crooks often misuse URL …
First look at Windows 8 security features
Windows 8 launched this week. It brings a new interface, but under the hood, it introduces a number of new security features. The most significant change in terms of security …
Best practices from healthcare and compliance experts
Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …
Windows 8 launch prompts thoughts on life after XP
Much has been made of the extensive changes that Microsoft has revealed around the aesthetics and performance of Windows 8, as well as the possible effects these changes will …
The anatomy of cyber security exercises
In its new report, the EU’s ‘cyber-security agency’ ENISA (the European Network and Information Security Agency) examines 85 national and international …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits