Help Net Security
New capabilities for the IBM security intelligence platform
IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …
Six principles for effective cloud computing
The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …
Juniper Networks acquires Mykonos Software
Juniper Networks has acquired Mykonos Software, a provider of Intrusion Deception Systems that protect websites and web applications. Under the terms of the agreement, Juniper …
Metasploit identifies IPv6 security risks
Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …
New backup appliances from Imation
Imation introduced new purpose-built backup appliances designed to enable SMBs to safeguard their information with multiple levels of data protection from a single backup …
Virtualized security routers for cloud security
Halon Security announced a next-generation firewall and security router as a virtual appliance named Virtual Security Router (VSR). VSR is a complete security package for …
Users don’t bother changing default passwords
Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect …
ISO 27001 and BS 25999-2: Why is it better to implement them together?
Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does …
Security toolkit for online mobile applications
KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: …
Akamai protects enterprises from DDoS and application security attacks
Akamai Technologies introduced Akamai Kona Site Defender, a service designed to protect the brand value of companies by shielding their web sites, applications and associated …
Novell integrates Mac device management
Novell announced the availability ZENworks 11 Support Pack 2 which includes integrated device management for Mac, and introduces a new product offering with ZENworks Full Disk …
Security platform uses virtual machine introspection
CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, …