Help Net Security
Introducing Windows Server 2012
Get a head start evaluating Window Server 2012 with technical insights from a Microsoft MVP who’s worked extensively with the beta release. This practical introduction …
Real-time alert system shows active cyber attacks in 3D
A solution to the problem of how to spot cyber attacks on a network as soon as they have begun might just be coming from Japan, reports DigInfo TV. Researchers from the …
HP secures the mobile workforce
HP announced new offerings to help SMBs prepare their technology infrastructures for a growing mobile workforce. With more than 1.1 billion mobile appliances in use worldwide, …
New version of NGINX web server to support OCSP-stapling
GlobalSign, DigiCert, Comodo, and NGINX announced a joint effort and a sponsored development contract, to enhance the NGINX open source web server to support OCSP-stapling. …
Older means wiser to computer security
A new Dimensional Research and ZoneAlarm report found that 18 – 25s are more confident in their security knowledge than 56 – 65s, but have experienced more …
Drobo redefines personal and professional backup
Drobo announced a new generation of storage devices. The Drobo 5D and Drobo Mini are designed to accelerate workflows for creative professionals managing data-intensive files, …
Federated identity service based on virtualization
Radiant Logic released RadiantOne VDS 6. Designed to provide one logical access point for enterprise identities, it enables authentication and authorization across multiple …
Control electronics through Wi-Fi with Belkin WeMo
Belkin launched WeMo, a line of modular, Wi-Fi-based products that turn an iPhone, iPad, or iPod touch into a remote control for household devices. Consisting of two initial …
Virtualized application delivery appliances from Array Networks
Array Networks announced its new APV 800 Series multi-tenant virtualized application delivery appliances and vAPV soft-ADCs. Powered by Array’s 64-bit SpeedCore …
Seven Databases in Seven Weeks
Data is getting bigger and more complex by the day, and so are your choices in handling it. From traditional RDBMS to newer NoSQL approaches, Seven Databases in Seven Weeks …
Online file sharing poses great security risks
As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …
Check Point releases new DDoS Protector appliances
Check Point introduced a new line of security appliances designed to fight DDoS attacks. The DDoS Protector appliances deliver multi-layered protection and up to 12 Gbps of …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)