Help Net Security
Do I need a data center?
If you still own your own data center and this question has not already crossed your mind, then you might be spending more money than you need, subjecting your organization to …
Eating the US EMV elephant
Last week, Visa announced that it would eliminate the requirement for eligible merchants to annually validate their compliance with the PCI DSS for any year in which at least …
Toshiba e-Studio855SE series with advanced security features
Toshiba introduced their new e-STUDIO855SE Series (models 555SE, 655SE, 755SE, 855SE) which provides Hard Disk Drive (HDD) Encryption and Data Overwrite out of the box. …
Cisco Firewall Services Module DoS vulnerability
A vulnerability exists in the Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers that may cause the Cisco FWSM to …
Control physical and virtual machines on a network
Shavlik Technologies announced solutions that provide an approach to controlling all physical and virtual machines on a network. The company introduced NetChk Protect 7.8 and …
Video: Light painting Wi-Fi
This project explores the invisible terrain of Wi-Fi networks in urban spaces by light painting signal strength in long-exposure photographs. A four meter long measuring rod …
Critical data exchange in the cloud
The pace of business today requires that critical information can be accessed anywhere, anytime. Furthermore, this sharing of information often happens amongst both internal …
Week in review: Facebook scams, OddJob Trojan and corporate espionage via social networks
Here’s an overview of some of last week’s most interesting news and articles: New types of cookies raise online privacy concerns The advertising industry has led …
Social media authenticity, privacy and security
Panda Security is providing guidance on ways to safely and securely integrate social media strategies into an SMB. Panda Security discovered that 78 percent use social …
Going “eye to eye” with network security threats
One of the ironies of our increasingly technology-dependent society is that you need an ever increasing amount of technology to address the failings or risks of the technology …
Failure to invest in secure software a major risk
Failure to take software security seriously is putting organizations, brands and people at risk, according to a report by Creative Intellect Consulting. Key highlights from …
Integrated single sign-on and authentication to cloud and SaaS
SafeNet announced Authentication Manager (SAM) 8.0. The unified enterprise platform combines strong authentication and identity federation to help organizations centrally …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)