Help Net Security
Wipe technology for self-encrypting disk drives
Toshiba announced Wipe for Toshiba Self-Encrypting Drive (SED) models, a technology that allows special security capabilities, such as the world’s first ability for …
Tektronix Communications acquires Arbor Networks
Tektronix Communications has signed a definitive agreement to acquire Arbor Networks. The acquisition is expected to close in September and the terms of the acquisition are …
New web application firewalls from Fortinet
Fortinet announced two new appliances for its FortiWeb family of web application firewalls – the FortiWeb-1000C, designed for mid-to-large enterprises, and …
Free protection against Blackhat SEO threats
Zscaler released Search Engine Security (SES), a free solution specifically designed to combat Blackhat SEO attacks. Such attacks leverage Search Engine Optimization (SEO) …
Colleges breach students’ sensitive information
College students nationwide can be especially vulnerable to identity theft because they often give out personally identifiable information. Some universities have even been …
VirtualBox: Full virtualizer for x86 hardware
VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …
How to render SSL useless
In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.
Week in review: Signs of computer infection, iPhone jailbreaking and Facebook mobile privacy
Here’s an overview of some of last week’s most interesting news and videos: Web 2.0 security in the workplace The use of social networking applications has …
Facebook virus hoax spreading rapidly
Sophos is advising Facebook users to think before passing on a virus warning that is rapidly spreading across the social network. A large number of users are currently …
Microsoft Exchange Server 2010 Best Practices
Apply best practices for administering Exchange Server 2010 and SP1 and optimize your operational efficiency. Microsoft Exchange Server 2010 Best Practices captures the …
Managed DNS Service integrate DNS, DHCP and IPAM
BlueCat Networks launched Proteus Cloud Services, a managed DNS service that provides control and central management of external DNS as well as enabling organizations to …
Fighting illegal content on the Internet
Detective Sergeant Michael Moran specializes in the domain of online child exploitation and in his address to the Institute, he focused on Interpol’s role in the fight …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades