Help Net Security
Create a Wi-Fi hotspot anywhere
TP-LINK announced two new Portable Wireless N Routers, designed to provide high-speed Internet access anywhere you go. Both routers are ideal for connecting tablet computers, …
Solutions for inspecting and securing SSL traffic
Fidelis Security Systems announced the SSL Decoder within Fidelis XPS, which provides the ability to assess the authenticity of an SSL certificate. They also introduced the …
Changing nature of DDoS attacks
The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …
Personal electronic signatures for everyone
DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …
Change management leads to security breaches
75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …
Why do companies backup infrequently?
Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …
Teach children about online protection
In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …
nCircle PureCloud: Network security scanning service
nCircle announced PureCloud, a network security scanning service which combines security technology used by thousands of the world’s largest enterprises and government …
Mac OS X Lion: The Missing Manual
With Lion, Apple has unleashed the most innovative version of Mac OS X yet – and once again, David Pogue brings his humor and expertise to the #1 bestselling Mac book. …
Top requirements for operating data in the cloud
The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Survey. …
Effectiveness of web application firewalls
The best defense against web application vulnerabilities and threats is to professionally train Web Application Firewalls (WAFs) and to incorporate Dynamic Application …
CSA offers a practical road map for secure cloud adoption
The Cloud Security Alliance (CSA) today unveiled the third version of its Security Guidance for Critical Areas of Focus in Cloud Computing. This effort provides a practical, …
Featured news
Resources
Don't miss
- Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)
- Product showcase: Penetration test reporting with PentestPad
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses