Help Net Security
Summer holiday security checklist
SecureWorks outlines its top ten tips for IT and security managers to minimize risk during the holiday season. 1. Hackers don’t go on holiday – Many frontline …
Facebook’s 500 millionth member highlights risks
Lancope is warning IT administrators at Global 1000 companies to be aware of the hidden risks to corporate networks because of social networking sites such as Facebook, …
Disk encryption for Mac OS X
Sophos announced SafeGuard Disk Encryption for Mac, which protects against data breaches of confidential and private information on MacBooks and Macs. Today, businesses are …
Software Blade controls over 50,000 Web 2.0 applications and widgets
Check Point announced its new Application Control Software Blade that enables organizations to secure and manage the use of thousands of Web 2.0 applications in the …
Web 2.0 security in the workplace
The use of social networking applications has significantly lowered the security posture for up to 82 percent of organizations in a new survey by the Ponemon Institute and …
Free anti-spam software from Cloudmark
Released as a free download, Cloudmark DesktopOne is a lightweight application that continuously filters e-mail to eliminate spam and protect users against phishing and …
Cyber threats to national security
Cybersecurity has increasingly become a national security priority over the past decade, according to a report by CACI and the U. S. Naval Institute (USNI). Cyber threats may …
Device security among biggest mobility concerns
McAfee announced the results of a survey of 150 Fortune 500 CIOs, CTOs and CSOs that reveals 76 percent of respondent organizations are planning at least one strategic …
55,000 machines compromised by Mumba botnet
Each year, cybercriminals generate billions of dollars by their criminal activities online. Therefore, the longer period of time a given malware remains undetected is directly …
Week in review: ATMs hacked, malware attacks
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: U.K. seeks cyber experts, offers challenge and educational and …
How to clean up a firewall rulebase
Over time, firewall rule bases tend to become large and complicated. They often include rules that are either partially or completely unused, expired or shadowed. The problem …
Security pros say serious mobile device and social network breaches are rare
RSA Conference released the results of its recent survey of security professionals regarding issues like cloud computing, mobile devices and social networking. The final study …