Help Net Security
Users continue risky Internet behavior after a security breach
A new study by the Ponemon Institute examined behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling …
Endpoint Protector 2008 expands its reach in the Linux world
CoSoSys announced today the release of its latest version of Endpoint Protector 2008 which features support for Red Hat Linux 5 and Fedora 9 as server operating systems. The …
Malicious worm attacks social networks
PandaLabs has detected Boface.G, a new worm that uses the Facebook and MySpace social networks to spread. The Boface.G worm posts a link on the infected users’ profile …
TrustedID introduces the first consumer-facing predictive identity rating
TrustedID announced TrustedID’s Identity Threat Score, the first predictive identity rating for consumers. The Identity Threat Score allows people to understand, via a …
Free log and compliance management virtual appliance from Q1 Labs
Q1 Labs announced the availability of a free, downloadable, log management and compliance product that provides organizations with visibility across their networks, data …
Webroot Web Security SaaS to protect from Web-borne malware
Webroot released Web Security SaaS to further protect organizations around the world from the rapidly increasing amount of Web-borne threats. Web-borne malware increased more …
Trust No One
It’s easy to say what we’re all securing our systems and data against. But isn’t easy to say exactly who we need to secure against, nor who presents the …
Yoggie opens up its miniature hardware firewall
Yoggie Security Systems launched its new Open Firewall Pico and Open Firewall SOHO, the first open hardware firewalls based on its Gatekeeper technology. The Open Firewall …
Critical infrastructure is not prepared for cyber attacks
Secure Computing announced the results of a study conducted during August and September 2008 in the US, Canada and Europe. The study surveyed 199 international security …
Automated information management in cloud storage environments with EMC Atmos
EMC announced its first cloud infrastructure offering, EMC Atmos, the first multi-petabyte information management solution designed to help customers automatically manage and …
Meru Networks brings virtualization to wireless LANs
Meru Networks has brought the techniques of virtualization to its enterprise wireless LAN products, allowing an optimization of radio frequency (RF) resources that raises WLAN …
eEye bulnerability assessment via SaaS Model
eEye Digital Security announced the availability of Retina OnDemand, which provides network security via the Software-as-a-Service (SaaS) model. By using the SaaS model, …
Featured news
Resources
Don't miss
- Cyber trends set to influence business strategies
- How to use Apple’s App Privacy Report to monitor data tracking
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware