Help Net Security
How did PC users protect themselves against viruses ten years ago?
Avira surveyed 5,543 international web surfers to find out how they dealt with the issue of IT security ten years ago, when the number of computer attacks rose sharply. The …
Real-time traffic intelligence and security of large IP networks
Narus announced a new release of NarusInsight, its real-time traffic intelligence system. This latest version introduces customizable monitoring capabilities, powerful …
Sophos Free Encryption
Sophos Free Encryption lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected …
Forensic toolkit delivers speed, analytics and scalability
AccessData announced the release of version 3 of Forensic Toolkit, a solution that delivers enhanced analytics, remote device acquisition and expanded reporting options. GUI …
Video: How to steal a botnet
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A …
Desktop virtualization and security survey
Imprivata conducted a national survey targeting executives across a wide array of industries (including healthcare, financial services, state and local governments agencies) …
Oracle releases version 9 of Application Testing Suite
Oracle announced version 9 of the Oracle Application Testing Suite, an integrated solution for load testing, functional testing and test management, enabling customers to …
VLC 1.0.2 fixes security issue
After almost 2 months and 27 million downloads of VLC 1.0.1, VideoLAN released VLC 1.0.2 introduces many fixes, notably for SSA decoding, v4l2, MacOS interface, ogg/theora, …
Cisco IOS Software NTP packet vulnerability
The Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. NTP runs over UDP, which in turn runs over IP. When a Cisco IOS Software …
Book giveaway: Get some free knowledge!
NOTE: The contest is now over, the winners have been notified. This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving …
Complimentary tool for measuring organizations’ breach index
Today breach notification regulations take effect under the HITECH Act. HIPAA-covered entities, including healthcare providers and business associates, are now required to …
Trends transforming IT in 2010
The Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends will also bring business and technology stakeholders …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage