Help Net Security
New book: “Programming Amazon Web Services”
The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …
K-12 schools’ cyber safety declines
CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …
Information Assurance: National Security’s New Front Line
Nowadays, few would ever consider using the Internet “unprotected” without a reliable anti-virus software and firewall solution installed on their PC networks. Yet …
Home security, monitoring and automation platform
uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …
Changes to the Nessus Vulnerability Scanner subscription model
Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …
Japanese P2P virus writer convicted, but escapes jail
24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …
Big Book of Windows Hacks
When it comes to "how to" articles there's a wealth of free material available online. With the growing popularity of blogs, a myriad of people are eager to share their hacks …
New book: “The Book of IMAP”
The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …
IT spending concerns mounting
An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …
E-mail mismanagement puts organizations at risk
E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …
Majority of U.S. consumers are likely to enroll in voice verification
According to a study conducted by Harris Interactive for Nuance Communications, consumers are embracing the use of voice verification in protecting important personal …
Mobile signatures and identity services are a success
Mobile signatures transform any mobile phone into an identity card and signature pen for online and mobile services. A user-chosen numerical password, or signing PIN, tells …
Featured news
Sponsored
Don't miss
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management
- Securing remote access to mission-critical OT assets