Help Net Security
Windows file protection with instant recovery
Condusiv Technologies launched Undelete 10, real time data protection and instant data recovery. The Server, Professional and Client editions of Undelete let you see the …
The CERT Guide to Insider Threats
Since 2001, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than …
Security budgets increase due to EU data protection laws
Tufin announced the results of a survey assessing how the recently announced updates to EU Data Protection legislation will impact IT compliance efforts. 42% of the 100 …
Microsoft: Cloud computing to create millions of jobs
Microsoft today published commissioned research from analyst firm IDC indicating that cloud computing will create nearly 14 million new jobs globally by 2015. IDC’s …
AirCover: Personal security app for iOS and Android
BlueSprig launched AirCover, a personal security app and location tool for iOS and Android devices. AirCover protects users from loss, theft, viruses, malware and other …
Video: Art Coviello interviews Tony Blair
At the RSA Conference 2012 in San Francisco last week, Art Coviello, Executive Vice President of EMC interviewed Tony Blair, former Prime Minister of Great Britian.
Voltage Security unveils Mobile Plus initiative
Voltage Security announced Voltage Security Mobile Plus, an initiative to extend its existing mobile security solutions to protect the new generation of mobile devices, …
Week in review: Facebook CSO interview, RSA Conference 2012 coverage
Here’s an overview of some of last week’s most interesting news, videos, interviews and podcasts: RSA Conference 2012 coverage Last week, the Help Net Security …
Locate and analyze deployed digital certificates for free
Venafi announced the availability of Venafi Assessor, a downloadable, easy-to-install, free software solution that scans an organization ‘s network to locate and analyze …
Identity, app and mobile device monitoring
Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively …
Trusted Computing Group unveils new membership option
Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, …
Real-time session monitoring by Cyber-Ark
Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring