Help Net Security
5 essential steps for improving virtualization security
With virtualization technologies becoming pervasive in the data center, SunGard Availability Services outlined five essential steps for addressing virtualization security …
Biometrics penetrating consumer markets
Long the domain of government and law enforcement agencies, biometric systems are increasingly moving into the market for personal data management and security. Laptops, …
Test for targeted VoIP eavesdropping with UCSniff
VIPER Lab released UCSniff, a free application that enables enterprises to determine if their VoIP networks are vulnerable to targeted eavesdropping. Jason Ostrom, Director of …
Visa sets global PCI DSS deadlines
Visa announced global mandates for compliance with the Payment Card Industry Data Security Standard (PCI DSS), creating a consistent framework for compliance among merchants, …
Ultra compact, low profile networking modules from Rabbit
Rabbit released the MiniCore series of easy to use ultra compact, low profile, low-cost networking modules. Available in pin-compatible wired and Wi-Fi versions, the MiniCore …
Mobility with centralized monitoring and auditing in StoneGate SSL VPN 1.2
Stonesoft introduced the StoneGate SSL VPN 1.2. With the new version, SSL VPN monitoring status and log details are integrated with the StoneGate Management Center, providing …
3M ToughShield sleeves protect against information theft
Data theft or “skimming” from smart cards and e-passports will be harder from documents kept in a new 3M product. 3M ToughShield brand Protective Sleeves offer …
Top 5 industries most at risk of web-based malware
ScanSafe released its report “The Vertical Risk’ which reveals the top 5 industries at risk of Web-delivered malware as well as an analysis of the types and …
WildPackets launches NetFlow Analyzer for OmniPeek
WildPackets released NetFlow Analyzer, an advanced extension for OmniPeek that allows users to analyze NetFlow statistics from Cisco networking hardware and seamlessly drill …
The $10,000 hacking contest
Gizmox, the developer of Visual WebGui open source platform, announced a contest which will pay $10,000 to anyone who can hack into its Visual WebGui Platform. The contest …
Users continue risky Internet behavior after a security breach
A new study by the Ponemon Institute examined behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling …
Endpoint Protector 2008 expands its reach in the Linux world
CoSoSys announced today the release of its latest version of Endpoint Protector 2008 which features support for Red Hat Linux 5 and Fedora 9 as server operating systems. The …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards