Help Net Security
Security architecture for trusted execution environments
Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …
Improved data recovery from SSDs
Data recovery from new types of data storage can be extremely time-consuming because of the need to research the algorithms used to originally store the data. Previously, …
Visibility and control of cloud services
Fidelis Security Systems announced a new cloud security solution which provides necessary visibility and control to decrease risks associated with using SaaS. The solution is …
Security for IT consumerization
Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …
Symantec releases Backup Exec 2012
Symantec announced Backup Exec 2012 to help users eliminate complexity, perform backups in 100 percent virtualized environments and deliver instantaneous and cloud-based …
F-Secure enters the content cloud
F-Secure Content Anywhere synchronizes a user’s content in the cloud, making it accessible on any device, anywhere and anytime of the day. Operators will be able to …
Mobile security experts converge on Munich for Amphion Forum
The Amphion Forum, launched in the United States last year by the same entrepreneur that founded the global RSA Conferences, has established itself as the hottest event for …
Doyenz partners with Symantec to power cloud-based recovery service
Doyenz announced that its cloud-based recovery technology was selected by Symantec to power the new Cloud DR Option available as part of Backup Exec 2012. The service enables …
U.S. developing plan to regulate critical infrastructure company cyber defense
A Senate plan to boost the US government’s ability to regulate the security of companies responsible for critical industries is causing debate as to exactly how far its …
Planning for IPv6
With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …
The state of cyberwar in the U.S.
As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …
Quick response, quick risk?
You don’t have to look far these days to spot a QR code. From their humble beginnings in labeling and tracking parts used in vehicle manufacturing, these blocky little …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022