Help Net Security
SaaS web application security scanning from NT OBJECTives
NT OBJECTives announced NTOSpider On-Demand, a cloud-based service enables organizations to scan thousands of applications while controlling scanning costs and optimizing …
Free advanced evasion technique testing software
Stonesoft released Evader, the first software-based testing tool that empowers organizations to test their network security solutions’ ability to withstand advanced …
Open source smart meter hacking framework released
SecureState announced the release of the full open source code of Termineter, a framework that allows users to assess the security of Smart Meter utility meters over the …
Detecting mobile device vulnerabilities using Nessus
This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.
Free data masking download
Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …
iOS digital identity app WISeID 4.0 released
WISeKey lauched WISeID 4.0 for iOS. The digital identity app can create an accountable identity from its personal data organizer, which securely stores private details such as …
Good Technology enhances enterprise mobility solutions
Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …
Hadoop: The Definitive Guide, 3rd Edition
Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …
Week in review: Grum botnet shutdown, Android malware, and Madi Trojan targeting the Middle East
Here’s an overview of some of last week’s most interesting news, articles and reviews: How to make smart grids To prepare for a successful roll-out of smart grids, …
Privacy commitment key to selection of cloud providers
Attracted by the opportunity to improve efficiency while cutting IT costs, SMBs are adopting cloud computing, yet they continue to express concerns about privacy in the cloud, …
One in ten SMEs have suffered a data hack
One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …
Free tool diagnoses PC issues
Webroot System Analyzer is a fast way for IT professionals to analyze the security profile and performance of individual machines. This free PC-assessment tool scans system …
Don't miss
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response