Help Net Security
Real-time threat intelligence delivery
As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …
Mobile security solution enforces policy in the cloud
Zscaler unveiled Zscaler Mobile, which adds a uniform way to secure the mobile experience for small to large organizations. The solution enforces policy in the cloud, not on …
Securing data centers from blended threats
Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said …
Cloud encryption software for private cloud infrastructures
CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company …
One in 10 IT pros have access to accounts from previous jobs
According to a survey that examines how IT professionals and employees view the use of policies and technologies to manage and protect users’ electronic identities, the …
Closing the privileged identity visibility gap
Security information and event management (SIEM) solutions have become a must-have in IT environments because the technology helps make sense of the vast quantities of data …
Cloud-based software reputation platform
Bit9 announces the first open, cloud-based reputation platform available to assess the trustworthiness of software. The Bit9 Global Software Registry (GSR) is now accessible …
Photos: RSA Conference 2011 Expo
The real action is on the expo floor. Plenty of hardware at the Stonesoft booth. Discussions were lively at the PhoneFactor booth. One of many high profile presentations at …
Next generation Security-as-a-Service platform
Qualys introduced its Security-as-a-Service platform to host the QualysGuard IT security and compliance Software-as-a-Service (SaaS) suite of applications in the cloud. The …
70% of SMS spam is financial fraud
An analysis of SMS traffic conducted from March through December 2010 reveals that according to the reports of misuse submitted by AT&T, Bell Mobility, KT, Korean …
RSA Conference highlighted talks – Wednesday
For the lucky ones that are able to attend the RSA Conference today, here is a selected list of talks that look very promising: Fundamental Failures of Endpoint Security …
Managed cloud-based tokenization service
nuBridges announced nuBridges Protect Tokenization as a Service (TaaS), a cloud-based tokenization service for national and multi-national companies that want to protect …
Featured news
Resources
Don't miss
- CISA reveals new malware variant used on compromised Ivanti Connect Secure devices
- Windows 11 quick machine recovery: Restoring devices with boot issues
- Two things you need in place to successfully adopt AI
- Exegol: Open-source hacking environment
- Only 2-5% of application security alerts require immediate action