Help Net Security
IT leaders want greater insight
Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …
Cloud-based endpoint security with protection for Exchange Server
Panda Security released Panda Cloud Office Protection Advanced, a cloud-based endpoint security solution with protection for Exchange Server. This new module is fully …
Data privacy protection for Hadoop
Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy …
BoxCryptor: Cloud storage encryption
BoxCryptor allows you to encrypt entire folders using the AES-256 standard. Any file stored in the virtual BoxCryptor drive is individually encrypted and stored in the …
BYOD influences enterprise mobile security
The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile …
CEOs lack visibility into seriousness of security threats
CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The …
Free mobile security eBook from Veracode
Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …
Security tips to combat mobile device threats to healthcare
Mobile devices are increasingly exposing protected health information (PHI) in the healthcare space, with threat risks growing, according to the Department of Homeland …
Insider threat as prime security concern
Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …
nCircle automates new PCI DSS requirements
nCircle PureCloud automates the new internal vulnerability scan requirements included in the most recent update to the Payment Card Industry Data Security Standard (PCI DSS). …
Email encryption on iOS and Android
Voltage Security announced Voltage SecureMail Mobile Edition, a comprehensive program designed to extend data-centric security to a new generation of mobile devices. The …
Secure cloud file sharing for the enterprise
Varonis launched DatAnywhere, which extends the usability of corporate file sharing infrastructure to enable traditional file servers and NAS devices to behave like …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility