Help Net Security
Snort 2.8.4 is now available
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
Microsoft report shows rogue security software a top threat
Microsoft released the sixth volume of its Microsoft Security Intelligence Report, which showed a significant increase in rogue security software and evidence that threats are …
2009 brings worms and more worms
According to F-Secure, the biggest malware story of 2009 so far has been the Conficker (aka Downadup) worm. It is a classic worm exploiting vulnerabilities in Microsoft …
21 million personal card readers delivered in Europe
Xiring announces the 2009 market figures for strong authentication solutions. In total 21 million bank card based strong authentication solutions have been delivered in Europe …
The Manga Guide to Databases
While writing this review, I turned my head right and visually browsed my bookshelf. Somewhere in the third row there are six different books related to databases, especially …
National Security Council senior director to keynote RSA 2009
RSA Conference announced that Melissa Hathaway, Acting Senior Director for Cyberspace for the National Security Council (NSC) and Homeland Security Council (HSC), will deliver …
Survey shows configuration management is critical but organizations aren’t investing in it
Shavlik Technologies announced results of a survey the company recently conducted with responses from over 435 IT operations and security specialists. The survey illustrates …
Drobo Pro: self-monitoring and self-healing functionality
Data Robotics introduced DroboPro, which delivers a simplified storage experience enhanced by advanced self-monitoring and self-healing functionality that enables businesses …
Digital signage: A sustainable advantage
The results from an extensive study into the carbon emissions of digital signage compared with those of traditional signage, released today, show that the carbon consumption …
Port and peripheral device security with Zlock
Zecurion released Zlock 2.5, a network endpoint solution that controls and manages computer ports and peripheral devices across the enterprise. Zlock 2.5 monitors and manages …
PGP unveils new encryption solution
PGP Corporation announced PGP Whole Disk Encryption Workgroup Edition, a full disk encryption solution specifically designed for small businesses and workgroup environments …
Turn mobile phones into hardware tokens
Celestix Networks released their HOTPin Two-Factor Authentication (2FA) system that employs mobile phones and Windows devices as high-security hardware tokens. HOTPin is an …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics