Help Net Security
Disaster preparedness tips for computers
ISACA offers tips to the public and businesses to protect their computers, information and systems during a natural disaster. “Ensuring personal and employee safety is …
PBConnex: Full-disk encryption with pre-boot networking
WinMagic launched SecureDoc with PBConnex, a full-disk encryption solution with pre-boot networking. PBConnex, an extension to SecureDoc, fully integrates network support …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Week in review: Digital forensics, new Facebook Privacy Settings and RSA phishing email found
Here’s an overview of some of last week’s most interesting news, articles and videos: Chinese mobile phone monitoring service found What do you think cyber crooks …
Microsoft updates free security tools
Microsoft enhanced three of its free Security Development Lifecycle (SDL) tools – Threat Modeling, MiniFuzz, and RegExFuzz. Threat Modeling Tool 3.1.8 The Threat …
The Basics of Digital Forensics
The Basics of Digital Forensics will provide a foundation for people new to the digital forensics field. This book will teach people how to conduct examinations by discussing …
Cisco Certified Technician: New entry-level certification
Cisco introduced the Cisco Certified Technician (CCT) to its Career Certification Program. The CCT training and certification programs are designed for technicians who perform …
Cyber threat protection for enterprise networks
Damballa released Failsafe 4.2, an advance in detecting criminal command-and-control behavior in corporate networks. Failsafe pinpoints corporate assets under criminal …
CompTIA expands Security Trustmark Program
CompTIA expanded its Security Trustmark program to include two levels of the business accreditation, which identifies companies that follow industry-accepted best security …
Anonymous member charged with computer offences
Peter David Gibson, 22, has been charged with conspiracy to do an unauthorized act in relation to a computer, with intent to impair the operation of any computer or prevent or …
The importance of data de-identification in the risk assessment framework
Dataguise highlighted recent research and analysis showing that de-identification through data masking is an important aspect of a company’s overall risk assessment …
KillSwitch technology catches brute-force attacks
Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …
Featured news
Resources
Don't miss
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition