Please turn on your JavaScript for this page to function normally.
What threats can we expect in October?

Fraudulent online storefront promising cheap HP Touchpads, poisoned search engine results targeting users searching on Yahoo and Bing, and spam promising a US green card have …

How to conduct an internal audit according to ISO 27001 and BS 25999-2

The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …

Data security for businesses that don’t need a full security suite

Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …

Security pros say that hackers have the upper hand

The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …

Cyber threat defense, detection and response platform

LogRhythm announced LogRhythm 6.0, an evolution to its SIEM 2.0 security intelligence platform with significant innovations in cyber threat defense, detection and response. …

Website reputation and automatic blacklisting enhance GFI WebMonitor

GFI announced that GFI WebMonitor now includes new security and anti-malware features that enable small and medium-sized businesses to provide employee Internet access without …

40% of SMBs suffered breach due to unsafe Web surfing

40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of …

Network security platform for multiple X-Series deployments

Crossbeam announced that it has expanded its family of X-Series network security platforms with the X50, a new platform that enables larger IT organizations with multiple …

Photos: The look and feel of RSA Conference Europe 2011

Help Net Security is attending RSA Conference Europe 2011 in London this week. Here’s an overview of the event in photos. Art Coviello, Executive Vice President, EMC …

Invisible authentication for mobile applications

RSA announced the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password (OTP) or risk-based …

Cyber criminals outsourcing money-collecting to mobile operators

Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …

McAfee shoots for next generation IPS

McAfee announced its network security framework which integrates advanced network intrusion prevention with essential next-generation controls. The solution addresses a need …

Don't miss

Cybersecurity news