Help Net Security
2009 to see more malware on virtualization platforms and mobile devices
AppRiver published of its year-end spam report, State of Security 2008, and the Threat and Spamscape Forecast for 2009. According to report author, AppRiver Senior Security …
IBM unveils Rational AppScan Standard Edition 7.8
IBM Rational AppScan Standard Edition is a Web application security testing tool that automates vulnerability assessments. Here’s a short list of the interesting new …
Tackling the authentication nightmare
In the new edition of the HNS podcast, Jonathan Craymer, chairman of GrIDsure talks about tackling the authentication nightmare by getting the right balance between security …
Anonymous proxies a major security concern for IT managers
Web filtering specialist Bloxx announced the results of its independent Anonymous Proxy Survey, which reveals that an alarming 90% of IT Managers in the educational sector …
IT security standards planetarium
atsec information security today published the “IT security standard planetarium”, which depicts the relationships among many IT security standards. You can choose …
New Deep Security server and application protection software
Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …
Less than six weeks till SCALE 7X
Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …
Burglar arrested as police post CCTV images on Facebook
Sophos informs us that police in New Zealand have used popular social networking website Facebook to aid their criminal investigations, following the arrest of a 21-year-old …
Network Security Toolkit 1.8.1 has been released
The Network Security Toolkit is a bootable ISO live CD/DVD is based on Fedora 8. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security …
Video: Practitioner’s guide to capturing and analysis of RAM
Embedded below is Dale Beauchamp’s talk “Practitioner’s guide to capturing and analysis of RAM” from January 8th’s DojoSec event.
Security and other factors will dominate outsourcing decisions in 2009
The end-user, the economy, security requirements and the environment will be among the leading factors influencing enterprise clients’ technology outsourcing decisions …
New Cisco Aironet 1140 Series Access Point
Cisco announced the Aironet 1140 Series Access Point, the only dual-radio platform that combines full 802.11n Draft 2.0 performance (up to nine times the throughput of …
Featured news
Resources
Don't miss
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam