Help Net Security
Experts run large cyber attack simulation exercise
Europe’s cyber security experts are testing their responses today in the first ever pan-European cyber-attack simulation exercise. In “Cyber Europe 2010“, …
Consensus IT security metrics
The Center for Internet Security (CIS) announced an updated release of its CIS Metrics, the industry’s first consensus metrics for information security. The release …
New vulnerability impacts Internet Explorer users
Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …
New deep packet analysis technology
NetScout Systems announced Adaptive Session Intelligence (ASI) technology, a transformative real-time Deep Packet Analysis (DPA) engine that allows both enterprises and …
Measure, visualize and understand WLAN clients
AirMagnet released n (including the AirMagnet Planner module) and AirMagnet WiFi Analyzer PRO 9.0. Both products now include the company’s new multi-adapter solution, …
End-to-end data security
RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …
Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
Smartphone security and privacy protection
With the rapid adoption of smartphones, concerns about security and privacy of data on the phone are increasing. Consumers realize that they have an extensive amount of …
No big bang in PCI 2.0
As expected, PCI 2.0 rolls up a number of minor changes, but there really is no Big Bang in this document. A number of people have been disappointed by this since for the past …
Free Mac anti-virus for home users
Sophos announced the availability of a free Mac anti-virus product for home users. Based on Sophos’s security software, which protects over 100 million business users …
Bluelog: Bluetooth site survey tool
Bluelog is a Linux Bluetooth scanner written to do a single task, log devices that are in discoverable mode. It is intended to be used as a site survey tool, determining how …
SOURCE Boston and Seattle CFP is now open
SOURCE Conference brings security experts and business professionals together in an intimate and personal environment to discuss the security industry’s most important …
Featured news
Resources
Don't miss
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS