Help Net Security
Optical transaction signing device limits ebanking fraud
SafeNet announced the eToken 3500, an electronic signing and strong authentication token-based device that will enable financial services organizations to achieve risk …
Intelligent information governance from Symantec
In order to enable organizations to better protect their information, establish retention policies and streamline their eDiscovery process, Symantec announced its plans for …
Fortinet releases three new appliances
Fortinet introduced three new members to its FortiWeb Web application firewall product family – the FortiWeb-4000C, FortiWeb-3000C FSX and FortiWeb-400C. The new product …
Top disaster recovery issues
It is no surprise that disaster preparation is top of mind among people these days. The images and stories coming out of Japan following the devastating earthquake and tsunami …
First sub-$50 cloud router
D-Link introduced the first sub-$50 Wi-Fi router with advanced cloud services – the new D-Link Cloud Router (DIR-605L). In addition to bringing cloud-enabled devices to …
Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …
10 years of Microsoft’s Trustworthy Computing Initiative
Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …
Chinese using malware to attack US DoD smart card security
AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …
Volume and sophistication of attacks to increase
Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …
Identity intelligence and the complexity of security
An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …
Secure web gateway protection from Sophos
Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …
Microsoft SharePoint 2010: Deploying Cloud-Based Solutions
Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …
Featured news
Resources
Don't miss
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently