Help Net Security
Network security change workflow solution
AlgoSec launched FireFlow, an-end-to-end policy change workflow solution which automates what is often a disjointed and manual process to ensure that changes to network …
Mismatch between IT security challenges and deployed solutions
The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …
Sophos assists computer crime unit in a botnet master case
Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley. The hacker, of Panama City, Florida, who went by the alias …
Virtual worlds face malware reality check
Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …
Explaining non-delivery report type of spam
Research shows that up to 90% of emails received by companies are spam, and spammers have adopted a variety of methods to bypass spam filters used in anti-spam software. In …
PCI Compliance Explained
Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …
When it comes to data security breaches, the general public doesn’t need to know
When it comes to data security breaches, 78 percent of US IT decision-makers feel that companies do not need to inform the general public; this according to a recent survey by …
Best of Open Source Security Conference announced
Sourcefire announced the launch of the Best of Open Source Security (BOSS) Conference. Scheduled to run concurrently with Sourcefire’s annual customer summit, the BOSS …
Cross platform data security for Windows Vista, XP & Mac OS X
GT Security launched SecuriKey v3.0, providing full support for Windows Vista, Windows XP, Mac OS X Leopard and Mac OS X Tiger. Designed to keep mobile data safe, SecuriKey …
Free e-book: “Scared Safe: Life’s Little Identity Theft Prevention Handbook”
E-Book entitled “SCARED SAFE: Life’s Little Identity Theft Prevention Handbook” by Todd Feinman, is available for free download beginning today for anyone …
New solution for protecting wireless devices from data loss
Based on the successful Computrace desktop and laptop management solution from Absolute, new Computrace Mobile is the only solution on the market for the management of all …
Storm and the future of social engineering
In 2007, Storm burst onto the scene and spread rapidly. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily …
Featured news
Resources
Don't miss
- Funding soars in a milestone year for Israeli cybersecurity
- Stratoshark: Wireshark for the cloud – now available!
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient