Help Net Security
Belkin OmniView Secure DVI KVM Switch with EAL 4+ and TAA compliancy
Belkin today announced its new OmniView Secure DVI KVM Switch, NIAP listed to conform to Common Criteria EAL 4+ and augmented with ALC_FLR.3—important factors for U.S. …
Email security offering that leverages the benefits of cloud computing
Cloudmark introduced its new CloudFilter email security solution, a cloud-based email security offering specifically designed to free Web hosters and service providers from …
First open source virtual desktop client
VMware announced the first open source client for virtual desktop infrastructure, VMware View Open Client which enables IT organizations to safely host user desktops in the …
Applied Binary Code Obfuscation
An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …
MSI unveils HoneyPoint Personal Edition 2.00
MSI released HoneyPoint Personal Edition 2.00, a solution that basically serves up “fake” services on systems. These services then lie in wait for attackers and …
Latest study shows data breach costs continue to rise
PGP Corp. and the Ponemon Institute announced results of the fourth annual U.S. Cost of a Data Breach Study. According to the study which examined 43 organizations across …
IPv6 Security
With the online world rapidly expanding, we are moving towards the IPv6 protocol. With this migration it becomes essential for networking professionals to gain insight into …
Encrypting USB drives with on-board antivirus scanning
Spyrus announced the Hydra PC ViP product family with on-board virus protection. Hydra PC ViP with the Hydra PC Sentry A-V antivirus scanning application completely protects …
Citizen data protection in focus: Europe needs a strategy
The European Network and Information Security Agency (ENISA) today launched its Position Paper on security features in European eID schemes. The paper gives the first overview …
Video: RFID wardriving
Ethical hacker Chris Paget demonstrates a low-cost mobile device that surreptitiously reads and clones RFID tags embedded in United States passport cards and enhanced …
Web applications are the Achilles’ heel for corporate IT security
IBM’s annual 2008 X-Force Trend and Risk report found that corporations are unwittingly putting their own customers at risk for cyber-criminal activity. With an alarming …
Manage all privileged passwords with Enterprise Random Password Manager
Lieberman Software announced version 4.7 of Enterprise Random Password Manager, providing improvements in deployment, scalability and compliance for large, multi-site …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption