Help Net Security
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
GFI WebMonitor 2011 released
GFI Software launched GFI WebMonitor 2011, a web filtering and Internet monitoring software that helps to boost employee productivity by giving administrators the ability to …
73,000 malware strains created daily in 2011
The number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, …
Securing your network from malware
One of the most significant threats to the security of your network, and the leading cause of data loss, is malware. Whether that malware comes in the form of a worm probing …
The growth of cryptography
It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …
IronBee versus ModSecurity
After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …
LotusCMS multiple vulnerabilities
A weakness and multiple vulnerabilities have been discovered in LotusCMS, which can be exploited by malicious users to disclose sensitive information and compromise a …
How antivirus and antispyware help keep malware at bay
When it comes to creating Internet security threats, malware writers are masters of disguise and manipulation. They are constantly evolving their tactics to find new ways to …
Health Net suffers massive data breach
Health Net is conducting an investigation into several server drives that are unaccounted for from its data center operation located in Rancho Cordova, Calif. This …
Splunk 4.2 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.2 …
Complexity as the leading security issue
Security complexity is the number one obstacle that organizations face today. Research from Check Point and the Ponemon Institute shows organizations struggle with a growing …
F-Secure Policy Manager 10 released
Effective security management of corporate computers and servers is all about the consistency, speed and efficiency of operations. Policy Manager 10 automates daily operations …
Featured news
Resources
Don't miss
- Enzoic AD Lite Password Audit Report
- WhatsApp vulnerability could be used to infect Windows users with malware (CVE-2025-30401)
- RCE flaw in MSP-friendly file sharing platform exploited by attackers (CVE-2025-30406)
- Why CISOs are doubling down on cyber crisis simulations
- Transforming cybersecurity into a strategic business enabler