Help Net Security
Open source biometrics technology for mobile devices, PCs and servers
DigitalPersona has open sourced its new MINEX-certified FingerJetFX fingerprint feature extraction technology. FingerJetFX, Open Source Edition (OSE), is free, portable …
Cloud security best practices and tips
With the adoption of cloud computing continuing to accelerate, the need to adopt and maintain effective security and compliance practices is more important that ever. To help …
Email archive productivity headache
U.S. businesses are failing to maximize the efficiency with which they extract useful business intelligence from archived email, according to GFI Software. While a majority of …
RSA updates Data Loss Prevention Suite
RSA announced enhancements to its DLP Suite, a collection of risk-based data loss prevention products. The latest version offers enhancements that allow global organizations …
Expect an escalation in targeted attacks
Organizations and Internet users can expect an escalation in targeted attacks, growing social media threats and an increase in mobile malware, according to the M86 Security. …
Securely share files between PC, Mac, iOS and Android
Trend Micro released SafeSync, a tool for safe and simple synchronization. The new offering provides consumers an enhanced look and feel, simplified sync functionality and …
Free webinar: ISO 9001 for ISO 27001 implementation
Most of the companies that have implemented ISO 9001 have no idea they can implement ISO 27001, this increasingly popular information security standard, with much less effort …
Email archiving with business intelligence capabilities
GFI Software announced GFI MailArchiver, an email archiving solution that includes MailInsights, a data analysis tool that enables SMBs to maximize the wealth of information …
Forensics for advanced threat activity
Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …
Watch your smartphone on Black Friday
Credant Technologies announced the results of its most recent survey of the number of wireless devices lost and found at 15 of the busiest shopping malls in America. Nearly …
SAP NetWeaver multiple vulnerabilities
Digital Security Research Group has reported multiple vulnerabilities in SAP NetWeaver, which can be exploited by malicious users to conduct script insertion attacks, …
Study of next-generation firewall deployments
The results of a Ponemon Institute survey show 55 percent of users globally, and 64 percent in the U.S., are leveraging next-generation firewalls to augment their current …
Featured news
Resources
Don't miss
- Your dependencies are 278 days out of date and your pipelines aren’t protected
- Security debt is becoming a governance issue for CISOs
- BlacksmithAI: Open-source AI-powered penetration testing framework
- When cyber threats start thinking for themselves
- IronCurtain: An open-source, safeguard layer for autonomous AI assistants