Please turn on your JavaScript for this page to function normally.
Trend Micro Deep Security Parns Common Criteria EAL 4+ certification

Trend Micro announced that its advanced server and virtualization security solution, Deep Security achieved Common Criteria Evaluation Assurance Level 4 augmented (EAL 4+) …

Win a free ticket to RSA Conference Europe 2011

RSA Conference Europe 2011 is scheduled to be held in London on October 11-13, and Help Net Security is offering a free ticket to the event for one lucky reader. RSA …

Serious disconnect between security perceptions and reality

There’s a serious disconnect between security perceptions and reality among IT Enterprise security managers, according to McAfee. The 2011 Data Center Security Survey …

Facebook now protects users from malicious links

Facebook and Websense announced a technology integration partnership that helps to protect Facebook users from links that lead to malware and malicious sites. Starting today, …

Key issues facing SaaS industry

More than 95 percent of organizations expect to maintain or increase their investments in software as a service (SaaS) and more than one-third have migration projects under …

Symantec IM Manager multiple vulnerabilities

Multiple vulnerabilities have been reported in Symantec IM Manager, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to …

Week in review: Mysql.com hack, QR codes leading to malware and Facebook fixes post-logout tracking cookie

Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: Facebook changes raise serious security concerns The last few …

XenServer 6 released

Citrix Systems released XenServer 6. As a key component of the Citrix cloud computing and virtualisation strategy, XenServer 6 brings new optimizations and improved …

SSL Labs launches two Convergence notaries

Convergence is Moxie Marlinspike‘s attempt to introduce fresh thinking into the debate about PKI, certificate authorities, and trust. A hint of what was in the works was …

Critical vulnerabilities triple in 2011

Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …

Smartphone users choose convenience over security

In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …

Content protection for Android devices

Elliptic Technologies expanded its DTCP-IP content protection offering to include support for Android used in a myriad of consumer devices, including DLNA enabled smartphones …

Don't miss

Cybersecurity news