Help Net Security
DellKACE unveils appliance for improved endpoint security
Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …
Top words cybercriminals use in fake emails
The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …
Ethics of Big Data
What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Decoding digital danger: The ever-moving threat
It was announced recently that GCHQ, the Government’s electronic intelligence unit, is to advise Britain’s senior business leaders on how to oppose the mounting …
Gartner says Windows 8 is a big gamble
Microsoft is taking a big gamble over the next few months with Windows and Office, the two products responsible for most of its revenue and profit, according to Gartner. It is …
Learning Unix for OS X Mountain Lion
Beneath OS X easy-to-use GUI interface lies a powerful Unix engine. Mac users have Unix, as well as a host of tools ported over from Linux, at their fingertips; the just need …
Week in review: IE zero-day patched, Flame C&Cs reveal more malware, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Google adds Do Not Track support to Chrome The next official release of …
Ex-CME programmer admits to stealing source code
A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …
Key components for mobile device management of BYOD
The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …
Moving federal mission-critical applications to the cloud
As federal agencies are making cloud progress, the early-adopters that are moving their mission-critical applications to the cloud are realizing cost savings and improved …
SUSE Manager update streamlines Linux management
SUSE released SUSE Manager 1.7 of its systems management solution for enterprise Linux environments. SUSE Manager’s capabilities help enterprises to comprehensively …
Featured news
Resources
Don't miss
- Security at AI speed: The new CISO reality
- Apple privacy labels often don’t match what Chinese smart home apps do
- In GitHub’s advisory pipeline, some advisories move faster than others
- Don’t panic over CISA’s KEV list, use it smarter
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)