Help Net Security
Security for road warriors using Windows
CoSoSys released Carry it Easy +Plus 3.0 for portable storage devices. The new software version includes features that focus on increased security, productivity and comfort …
Despite mandate, only 30% of government devices are encrypted
Committee on Homeland Security Chairman Bennie G. Thompson (D-MS) and Committee Member Zoe Lofgren (D-CA) announced the release of a Government Accountability (GAO) report on …
StealthWatch System 5.8 for increased network visibility
Lancope announced the general availability of StealthWatch System 5.8. The system-wide upgrade includes new features that further utilize flow data, including Cisco IOS …
Cyber threats accelerate and browser vulnerabilities proliferate
IBM today released results from its X-Force 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that …
First database security solution for virtual environments
Secerno announced the availability of its award-winning Secerno.SQL database activity monitoring and blocking solution as a virtualised appliance on the Vmware platform. This …
Traditional vs. Non-Traditional Database Auditing
Traditional native audit tools and methods are useful for diagnosing problems at a given point in time, but they typically do not scale across the enterprise. The auditing …
Motorola to acquire AirDefense
Motorola has signed a definitive agreement to acquire privately held AirDefense, a leading wireless LAN (WLAN) security provider. Terms of the transaction were not disclosed. …
Enhanced enterprise-class data backup and recovery tools
Advanced Vault announced that the company’s data backup and recovery tools now provide support for 64-bit editions of Windows, Linux, Mac and FreeBSD operating systems. …
New modular 3-phase UPS systems
Tripp Lite, a manufacturer of power protection and connectivity equipment, has launched its latest range of Modular 3-Phase UPS Systems. The four new models, which include …
FBI vs Facebook
Another round of malware is being spammed with a subject “F.B.I. wants instant access to Facebook” and a link to a page hosting a malicious .exe file. E-mail: Web …
Upcoming Black Hat USA 2008 session: Jinx – Malware 2.0
Today’s Web 2.0 world sparks opportunities for Internet interactivity and community-building, but at the same time, leaves many Web sites and online users vulnerable to …
The changing role of information security in the enterpirse
Information security professionals believe they are moving towards a more pro-active, risk-based approach to securing their organisations and away from just IT and …
Featured news
Resources
Don't miss
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)