Help Net Security
Tenable Security unveils Log Correlation Engine 4
Tenable Network Security announced the availability of Log Correlation Engine (LCE) version 4. By combining normalized log data from devices throughout enterprise networks …
Programming Microsoft’s Clouds: Windows Azure and Office 365
This book offers an in-depth look at a wide range of cloud topics. It explains how companies can easily scale their cloud use up and down to fit their business requirements. …
Growing security demands, old security infrastructure
SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …
ISO 22301: An overview of BCM implementation process
While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …
Global 2000 networks are vulnerable to Flame-style attacks
Venafi has aggregated scanning data from the networks of 450 Global 2000 enterprises and discovered how frequently MD5-signed certificates are deployed – and it is quite …
Password security, one step at a time
Last week we saw millions of passwords leak from LinkedIn, eHarmony and Last.fm. Much has been written over the last twenty years about how to create strong passwords, but no …
PCI compliance scan for Google Drive
CloudLock announced a pattern matching engine that identifies, classifies, and secures sensitive information, including Personally Identifiable Information (PII), PCI data and …
The rise of the private cloud
More than half of North American cloud service providers (CSPs) reported that their customers are opting for the private cloud services model, while 32 percent are choosing …
One-click backup for Facebook and Flickr
Seagate introduced Backup Plus storage devices with one-click backup and the ability to save and share your content on Facebook and Flickr. Seagate Backup Plus hard drives …
Prevent metadata leaks with Metadacte 2.0
Litera released Metadacte 2.0, allowing companies to prevent metadata leaks, including information sent from mobile devices. Key new features include the ability to clean …
Implications of the rise of mobile devices
CIOs and IT leaders must address three key implications of the “post-PC” era, as workforces and consumers increasingly access IT applications and content through …
Dell SecureWorks unveils new managed security services
Dell SecureWorks announced the delivery of several new managed security services for enterprises looking to achieve greater ROI and efficiency on their security infrastructure …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility