Help Net Security
What threats can we expect in October?
Fraudulent online storefront promising cheap HP Touchpads, poisoned search engine results targeting users searching on Yahoo and Bing, and spam promising a US green card have …
How to conduct an internal audit according to ISO 27001 and BS 25999-2
The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …
Data security for businesses that don’t need a full security suite
Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …
Security pros say that hackers have the upper hand
The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …
Cyber threat defense, detection and response platform
LogRhythm announced LogRhythm 6.0, an evolution to its SIEM 2.0 security intelligence platform with significant innovations in cyber threat defense, detection and response. …
Website reputation and automatic blacklisting enhance GFI WebMonitor
GFI announced that GFI WebMonitor now includes new security and anti-malware features that enable small and medium-sized businesses to provide employee Internet access without …
40% of SMBs suffered breach due to unsafe Web surfing
40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of …
Network security platform for multiple X-Series deployments
Crossbeam announced that it has expanded its family of X-Series network security platforms with the X50, a new platform that enables larger IT organizations with multiple …
Photos: The look and feel of RSA Conference Europe 2011
Help Net Security is attending RSA Conference Europe 2011 in London this week. Here’s an overview of the event in photos. Art Coviello, Executive Vice President, EMC …
Invisible authentication for mobile applications
RSA announced the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password (OTP) or risk-based …
Cyber criminals outsourcing money-collecting to mobile operators
Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …
McAfee shoots for next generation IPS
McAfee announced its network security framework which integrates advanced network intrusion prevention with essential next-generation controls. The solution addresses a need …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)