Help Net Security
What security wants most from Big Data
More than two thirds of IT people think Big Data should be a strategic priority, according to Varonis. More than half expect Big Data to be a strategic initiative over the …
EMC acquires Syncplicity
EMC has acquired privately held Syncplicity, a provider of native cloud-based sync and share capabilities required by enterprise customers. Terms of the transaction were not …
SaaSID launches Cloud Application Manager
SaaSID unveiled Cloud Application Manager (CAM), security software that provides single sign on (SSO), application shaping and auditing of any applications accessed using a …
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Nmap 6 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Instant decryption of MS Office 2010 documents now possible
Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version …
Policy-based automation of storage provisioning
iWave Software announced iWave Storage Automator version 6, a storage automation software product that lets enterprise IT organizations and service providers deliver Storage …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …
Cloud Security Alliance announces EMEA congress
Building on the success of the Cloud Security Alliance Congresses held in the USA, the inaugural CSA EMEA Congress (Amsterdam, 25-26 September 2012) will provide practical …
IEEE introduces standard for body area networking
IEEE, the world’s largest professional association advancing technology for humanity, today announced a new standard, IEEE 802.15.6TM-2012, optimized to serve wireless …
Week in review: Vulnerable CCTV systems, Pinterest scam toolkits, and top three security concerns for CSOs and CIOs
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: IT candidates should shift career perspectives Enterprises seem to …
MacScan 2.9.3 with Google Chrome and SeaMonkey support released
SecureMac released MacScan 2.9.3, which features tracking cookie detection and cleaning for Google’s Chrome browser. MacScan is the premier Macintosh security program, …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility