Help Net Security
A Practical Guide to Fedora and Red Hat Enterprise Linux, 6th Edition
An increasing number of advanced users are drawn to open source solutions as an alternative to Microsoft Windows. The popular free Linux distribution Fedora and it's big …
76% of IT pros in the dark about unauthorized application downloads
While IT professionals recognize the dangers that unauthorized applications cause to their networks, most are letting these dangers go unnoticed, according to a survey by …
Static analysis tool for C and C++
GrammaTech announced CodeSonar 3.8, a static analysis tool for C and C++. Improvements in CodeSonar 3.8 include: Faster analysis that takes full advantage of multi-core …
Server network virtualization acceleration technology for VXLAN implementations
Broadcom announced its NetXtreme II server network virtualization (NV) acceleration technology for VXLAN implementations, improving server performance by more than 55 percent. …
Networkless working: The future of the public sector?
It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …
The top Internet dangers for kids
As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …
Network Management: Principles and Practices, 2nd Edition
Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …
Week in review: Java 0-day finally patched, and fast and furious reverse engineering
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Preparing for your first security breach
So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …
Effective MySQL Backup and Recovery
Effective MySQL: Backup and Recovery offers a no-nonsense approach to one of the most critical tasks of an operational DBA—performing, testing, and verifying backup and …
Kaspersky Lab publishes research about Wiper
In April 2012 a series of incidents were publicly reported about a destructive malware program, codenamed Wiper, which was attacking computer systems related to a number of …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits