Help Net Security
Cloud Security Alliance and IEEE join forces
The Cloud Security Alliance (CSA) and IEEE are joining forces to ensure that best practices and standards are developed and available to provide security assurance for cloud …
Get Backup: Free Mac backup software
Important aspects of your life are stored within the data on your computer, the loss of which can turn into a nightmare. To protect yourself from hard drive crash or human …
Fuzzing: Build security in
The greatest security challenge today is discovering new vulnerabilities. Software release cycles are getting faster and new technologies are increasingly complex, a perfect …
1Password coming to the iPad
1Password is the de facto choice for password safekeeping on the Mac. While there’s an iPhone application that complements the desktop version, the makers of this tool …
Spybot.AKB worm spreads across P2P networks and e-mail
PandaLabs detected a new worm, Spybot.AKB, which spreads using P2P programs (copying itself to the usual shared folders with different names) and also via e-mail. What’s …
Massive ZeuS compromise discovered
NetWitness analysts have discovered a dangerous new ZeuS botnet affecting 75,000 systems in 2,500 organizations around the world. The newly-discovered infestation, dubbed the …
Policing your IT police: Proactive security
When the global economy is in slowdown, there’s one sector that remains buoyant: crime. Illegal and illicit activities invariably rise as legitimate business falls, so …
Man gets 309 years in prison for identity theft
Robert Thompson, the leader of a massive identity theft and bribery scheme, was sentenced to 309 years in prison based on charges of conspiracy, wire fraud, mail fraud, bank …
Video: Cyber attack simulation
In the video below you can watch CNN’s Jeanne Meserve reports on the results a staged cyber attack.
Finalists announced for the “Most Innovative Company at RSA Conference 2010” contest
RSA Conference announced the top 10 finalists for its “Most Innovative Company at RSA Conference 2010” contest. This half-day interactive program is devoted to …
12 tips to ensure company data is kept private
Companies must consider the implications of using free communications services (such as email and data hosting) on their data privacy. Network Box offers IT managers steps to …
Exploring the boundaries of IT security
As Niels Bohr once said, prediction is difficult, especially about the future. Nevertheless, almost all network security companies try to assess risk and the potential impact …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits