Help Net Security
Security code review tool Agnitio 2.1 released
Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and …
Encrypt and protect virtual machine images
HighCloud Security unveiled VM-Centric Security, a solution to encrypt and protect virtual machine (VM) images and the data they contain throughout their lifecycle. The …
Week in review: 250,000 hacker conversations analyzed, making a cheap mobile malware jail and Stuxnet’s successor Duqu
Here’s an overview of some of last week’s most interesting news, articles, interviews and podcasts: Testing web applications for security flaws David Hoelzer is …
Anonymous proxy for iPhone and iPad
NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five …
Divorce is less stressful than safeguarding confidential data
How are IT managers coping with today’s threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they …
rCloud: Disaster recovery for virtual environments
Doyenz announced rCloud, a disaster recovery solution for SMBs that offers recovery for virtual environments. Purpose-built for VMware virtualized environments, rCloud can …
Fraud detection and cloud security from ActivIdentity
ActivIdentity introduced 4TRESS Authentication Appliance that offers multi-layered strong authentication, fraud detection and cloud security capabilities. The appliance …
Ten early warning signs of fraud
Anti-fraud consultancy UK Fraud published a list of ten common early warning signs which could alert management that fraud may be occurring in their organization. The list …
Analyze the virtual environment with vScope Explorer
vScope Explorer is a free tool that assesses the performance health of all VMs in an environment, across data centers and from multiple vCenter servers, displaying any …
SANS virtualization security course returns to London
The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
Free web service identifies Internet abuse
Zscaler released IPAbuseCheck, free web service which will allow them to query a dynamic ThreatLabZ database to identify whether any of their endpoint clients and IP addresses …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act