Help Net Security
Cloud-based security of mobile devices via Active Directory
Centrify announced DirectControl for Mobile, a cloud-based service lets enterprises centrally secure and manage smart phones and tablets using existing Active Directory …
Real-time web and data security from Websense
Websense unveiled the X10G, a scalable system with real-time data-aware contextual defenses, which are applied to all inbound and outbound requests, and that defend against …
Microsoft Windows Operating System Essentials
Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …
Citrix releases open source cloud platform
Today Citrix announced the availability of Citrix CloudStack 3, the first release of the open source cloud platform under the Citrix brand. CloudStack is already the …
Kaspersky Lab unveils virtualization security solution
Kaspersky Lab announced Kaspersky Security for Virtualization, focused on protecting evolving corporate IT infrastructures from malware and cybercriminals. The solution …
Best practices for online banking security
There are two common misconceptions about online banking security which are holding financial institutions back from offering their customers the best services possible. …
Tax payers unaware of identity theft risks
While consumers remain concerned about identity theft, there are some common misconceptions about the risk of preparing and submitting their tax documents, and many are …
Mobile hacks to increase with SDR adoption
Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …
Storage migration without host and application downtime
Hitachi introduced a nondisruptive migration service capability that migrates from Hitachi enterprise storage to Hitachi Virtual Storage Platform (VSP) and eliminates host and …
Inside Cyber Warfare, 2nd Edition
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …
Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011
Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …
Romney defeats Gingrich in US spam primaries
Mitt Romney, the former Massachusetts governor who’s leading polls in the race to become the Republican Party’s nominee for the US presidency, is also the favorite …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)