Help Net Security
NetSupport manager now offers smart card support
NetSupport announced the latest release of NetSupport Manager 10.3 remote control software. The newest release of NetSupport Manager has significant enhancements in the areas …
Instant messaging – see no evil, hear no evil
FaceTime Communications warns that with one in four employees admitting to sending information about company plans, finances or password/login credentials via instant …
Veracode’s application security testing solution for U.S. Government
Veracode announced it has entered into a partnership and reseller agreement with Patriot Technologies. As the “go-to” source for the Federal Government’s …
HNS Podcast: Vulnerability Management Considerations
In this HNS podcast, Anthony Alves from CORE Security Technologies discusses briefly vulnerability management. He covers some of the things you should consider while …
VPN solution for Symbian OS-based mobile devices
NCP provides users of Symbian OS-based mobile devices with secure access to the company network. The new IPSec client can be used, for example, on mobile devices such as the …
iDetector wireless network capabilities
Graphic Security Systems Corporation (GSSC) will include the Eye-Fi Card for its iDetector authentication device. The iDetector attachment utilizes a Canon digital camera as …
Integrated product for fighting online fraud and identity theft
Intellitactics and Radware have joined forces to provide businesses and government agencies a real-time capability to detect fraud and thwart identity theft. This alliance …
New version of ModSecurity open source web application firewall
Breach Security announced the latest version of its open source ModSecurity web application firewall. The latest release, ModSecurity v2.5, offers a significant improvement in …
Book signings at RSA Conference 2008
From the RSA Conference Blog: “Our speakers and panelists are a very prolific group with many titles to their names. Each year our bookstore partner, Digital Guru, …
Empirical Exploitation of Live Virtual Machine Migration
As virtualization continues to become increasingly popular in enterprise and organizational networks, operators and administrators are turning to live migration of virtual …
90% of public websites are vulnerable to attack
WhiteHat Security released the fourth installment of the WhiteHat Website Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a …
Automated system lock down tool for Oracle Enterprise Linux
Trusted Computer Solutions announced that it has become a member of the Oracle PartnerNetwork and now offers organizations that have invested in Oracle Enterprise Linux …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams