Help Net Security
Week in review: Java 0-day finally patched, and fast and furious reverse engineering
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Preparing for your first security breach
So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …
Effective MySQL Backup and Recovery
Effective MySQL: Backup and Recovery offers a no-nonsense approach to one of the most critical tasks of an operational DBA—performing, testing, and verifying backup and …
Kaspersky Lab publishes research about Wiper
In April 2012 a series of incidents were publicly reported about a destructive malware program, codenamed Wiper, which was attacking computer systems related to a number of …
Cybercriminals use throw-away domains to infiltrate enterprise networks
The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …
Secunia launches Corporate Software Inspector 6.0
Secunia announced the Secunia Corporate Software Inspector (CSI) 6.0 which provides customers with the ability to understand and evaluate their entire threat landscape, …
AirMapper App for Android measures Wi-Fi coverage and performance
Fluke Networks announced the AirMapper App, the first application for Android that provides a visual heat map of actual Wi-Fi throughput performance on smartphone and tablet …
UK data breaches up 1000% in five years
Imation today released figures obtained through a request under the Freedom of Information Act which show that data breach numbers in the UK have increased by more than 1000% …
Cloud Security Alliance Forms Big Data Working Group
The Cloud Security Alliance (CSA) and Fujitsu Laboratories of America announced launch of the Big Data Working Group which will take industry ownership in addressing the need …
vOPS Server Standard 6 extends control into cloud deployments
VKernel announced vOPS Server Standard 6.0. This release extends control into cloud environments and virtual machine (VM) performance with unified multi-data source VM issue …
Key challenges in proactive threat management
There is a downward trend in IT’s ability to consistently coordinate, measure and improve security data management processes, including log management, compliance …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC