Help Net Security
Greatest risks to database security
The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …
The state of global cyber-readiness
McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …
Identity and access management trends
Six major trends will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012, according to Gartner. “In 2012, …
Apache Shiro: Java security framework
Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …
The ABCs of security and compliance
Understanding Security and Compliance is as easy as ABC: Access, Breaches and Changes. At a distance security and compliance share many similarities. As you get into the …
High-performance wireless APs from Aruba Networks
Aruba Networks announced two additions to its portfolio of wireless access points. The Aruba Instant IAP-134 and IAP-135, both 900Mbps 802.11n access points, are designed for …
The Web Application Hacker’s Handbook, 2nd Edition
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …
Mobile security app combines antivirus, web and app protection
McAfee announced a new version of its Mobile Security software, providing smartphone and tablet owners with more controls to preserve their privacy and protection against …
Most disruptive and significant IT trends
451 Research, published an all-encompassing report highlighting the most disruptive and significant trends that the analyst firm expects to dominate and drive the enterprise …
Fingerprint security for Mac OS X
AuthenTec announced a new fingerprint security solution – including an Eikon fingerprint sensor and TrueSuite identity management software – for Mac computers …
Security analysis tool Trisul 2.3 released
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
Hacking and Securing iOS Applications
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must – chances are very high that your company’s iOS applications …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)