Help Net Security
Mobile phones expose businesses to massive risks
Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …
Portable encrypted Linux computing environment
SPYRUS announced a new version of Secure Pocket Drive that allows end users to build and distribute their own secure bootable Linux OS image. In addition to offering secure …
Oracle fixes 88 security vulnerabilities
Oracle’s Critical Patch Update for April 2012 fixes 88 security vulnerabilities across the product line. The amount of fixes isn’t really a big concern; it’s …
Tenable enhances Nessus Perimeter Service
Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …
Switching to the Mac: The Missing Manual, Lion Edition
There’s never been a better time to switch to Mac OS X and David Pogue’s newly released Switching to the Mac: The Missing Manual, Lion Edition can help you do it. …
Use iPads and iPhones securely on the job
MokaFive, whose software is driving the use and acceptance of Macs in the enterprise, is now doing the same for the iPad and iPhone. The new MokaFive for iOS unites work and …
Scalable network encryption for the cloud
Certes Networks announced the vCEP (virtual Certes Enforcement Point), a scalable network encryption solution for the cloud. This virtual appliance allows organizations to …
Application control with Faronics Anti-Executable
Faronics released a new version of Faronics Anti-Executable, an application control tool that ensures endpoint security by only permitting approved executables to run on a …
What is the top target of cyber attacks?
Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according …
Big data disruptions can be tamed
Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner. Big …
Optimize Android for free with Bitdefender Power Tune-Up
Bitdefender launched Power Tune-Up, a free app to maximize the performance of your Android while sparing battery power and controlling data traffic. “Bitdefender is …
Nessus 5.0.1 vulnerability scanner released
Tenable release of Nessus 5.0.1, a vulnerability and configuration assessment solution for enterprises and security professionals. This release improves the stability on all …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility