Help Net Security
SIEM and vulnerability management integration
LogRhythm and Qualys announced their partnership and the integration of LogRhythm’s SIEM 2.0 platform with Qualys’ QualysGuard Vulnerability Management (VM). The …
Businesses fail to learn from 2011 data breaches
While data breaches perpetuated during 2011 clearly demonstrated the need for more comprehensive encryption of business and customer data, a survey of over 170 IT managers …
IT security pros most afraid of highly publicized attacks
Concerns over hacktivism and targeted state-sponsored attacks are at the top of security professionals’ minds according to a new survey and research report sponsored by …
IEEE launches standard to aid smart-grid communications
IEEE announced the publication of a new standard, as well as the launch of three new standards-development activities, all designed to enhance the communications and …
Week in review: Ethical hacking, malicious Instagram Android app, and the success story of the cleanest ISP in the world
Here’s an overview of some of last week’s most interesting news, videos, reviews, podcasts, interviews and articles: SSL/TLS deployment best practices In this …
HP identifies the sophistication of security attacks
HP published the 2011 Top Cyber Security Risks Report, which identifies the growing sophistication and severity of security attacks and the resulting risks. The report …
How cybercriminals are infecting networks
Research by Websense reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures 2) evasive and hard-to-detect infiltration …
The importance of ethical hacking
The need for more effective information security practices is increasingly evident with each security breach reported in the media. When adopting new technologies like cloud …
Most IT admins considered switching careers due to stress
67% of IT administrators have considered switching careers due to job stress, according to GFI Software. Managers, users (employees), and tight deadlines were cited as the …
Control and encrypt email with CipherPost Pro
AppRiver unveiled a secure email delivery solution, CipherPost Pro, a service that allows businesses to control and encrypt email and email attachments. CipherPost Pro …
Universal IPsec VPN client for Android 4.0
NCP engineering released a preview version of its IPsec VPN client to support the remote access needs of Android 4.0 (Ice Cream Sandwich) platform users. The NCP Secure …
Businesses unable to comply with EC 24 hour breach notification
UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed