Help Net Security
New book: “Mac OS X for Unix Geeks, 4th Edition”
If you’re a developer or system administrator lured to Mac OS X because of its Unix roots, you’ll quickly discover that performing Unix tasks on a Mac is different …
RFID moving into the data center
IT managers are increasingly finding value in using RFID within their own IT operations. This is spurring adoption of RFID in data centers and across corporate campuses, …
Be prepared with a recovery plan that works
SecureWorks is advising organizations to be proactive at protecting their information technology assets in case they are faced with a natural or man-made disaster. This means …
Secure access to Lotus Notes and Domino from iPhone
IBM announced an expansion of its Lotus Notes and Domino collaboration flagship software to new markets and users with a new version that delivers higher levels of mobility …
Motorola completes acquisition of AirDefense
Motorola announced the completion of its acquisition of WLAN security provider AirDefense. As
Green SSL VPN series
Array Networks expanded its power-efficient, green SPX series (1800, 2800, 4800, 5800, 6800). The new SPX series offers flexible remote identity-based access to enable a range …
New computer forensics training courses
NetSecurity Corporation expanded its portfolio of Hands-On How-To security courses to include computer forensics training classes. NetSecurity’s Hands-On How-To courses, …
OpenSSO Enterprise – Sun’s next-gen secure web services solution
Sun Microsystems announced Sun OpenSSO Enterprise software, the first open, high-performance and unified solution for access management, federation and secure Web services …
Security software is a necessary nuisance
Latest survey done by Trend Micro found that for most consumers, Internet security software is like tedious dental visits — compulsory, but needed. Memory consumption …
TJX data theft conspirator pleads guilty
A Miami, Florida man was convicted in federal court of conspiring to electronically break into corporate computer networks, download customers’ credit and debit card …
New book: “Googling Security”
Googling Security is the first book to reveal how Google’s vast information stockpiles could be used against you or your business-and what you can do to protect …
In light of new Nevada law data privacy faces significant risk
Beginning October 1, Nevada state law will require all businesses to employ an encryption tool for any electronic transmission that includes a customer’s personal …
Featured news
Resources
Don't miss
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)