Help Net Security
RentACoder phishing scam
Rent A Coder is a web-based marketplace often used for outsourcing software projects. Apparently there is a phishing scheme in play trying to capture user login information. …
New firewall appliances for mid-size companies
The new PA-2000 Series firewall enables mid-size enterprises or enterprises with remote locations to, for the first time, cost effectively achieve comprehensive, user-specific …
New Mantra with new data discovery and database security features
Tizor Systems announced Mantra 6 with updated features for data discovery, database security and ease of use. Mantra 6 features include automated discovery for finding …
RSA unveils advancements to the RSA Data Security System
RSA announced new capabilities in their Data Security System’s encryption and key management suite which are designed to secure sensitive data in file systems. RSA File …
Cyber Security Coordination
There’s been much discussion of late regarding the perceived lack of expediency by federal agencies to identify and prioritize critical cyber infrastructure needs. The …
Mobile surveillance platform for facilities security and law enforcement
Phoenix Worldwide Industries introduced a rapidly deployable, intelligent surveillance platform targeted toward municipalities, law enforcement and certified security …
10 Gig threat management system protects critical IP services
Arbor Networks announced a 10 Gig DDoS detection and mitigation system that enables application-layer attack protection. The Threat Management System 3100 (TMS) delivers deep …
New ForeScout CounterACT features PCI compliance kit
The payment card industry established the PCI DSS for the protection of cardholder information in response to widely publicized security breaches. Enforced through compulsory …
Q&A: iPhone Security and the Enterprise Market
Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community …
Third Brigade acquires open source host intrusion detection project
Third Brigade has acquired OSSEC, an open source, host-based intrusion detection system. The OSSEC project produces a multi-platform, scalable, host-based intrusion detection …
Network security change workflow solution
AlgoSec launched FireFlow, an-end-to-end policy change workflow solution which automates what is often a disjointed and manual process to ensure that changes to network …
Mismatch between IT security challenges and deployed solutions
The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …
Featured news
Resources
Don't miss
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program
- Attackers are probing Palo Alto Networks GlobalProtect portals
- Why global tensions are a cybersecurity problem for every business
- How to build an effective cybersecurity simulation