Help Net Security
IT has no choice but to embrace BYOD
Bring-Your-Own-Device (BYOD) and Bring-Your-Own-App (BYOA) trends started as a clandestine effort by employees to work more efficiently and grew rapidly. Since they …
Encore Networks launches ultra-low cost wireless VPN router
Encore Networks launched the EN-2000, an ultra-low cost wireless VPN router designed for high-availability M2M applications in fixed or portable locations supporting video …
Android backdoor lurking inside legitimate apps
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play …
API security for connecting the enterprise cloud
In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud. What …
A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress
In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max …
Microsoft fixes 37 vulnerabilities
Microsoft clearly wants everyone to shake off the dog days of summer and pay attention to patching. This month’s advance notice contains nine advisories spanning a range …
How security practitioners deal with incident response
A spate of high-profile security breaches and attacks means that security practitioners find themselves thinking a lot about incident response, according to a new SANS survey. …
GFI WebMonitor 2015 Beta 1 released
Beta 1 of a totally revamped GFI WebMonitor is now available for preview. GFI WebMonitor 2015 is a new, powerful version that really gives sysadmins the tools to manage …
Data breaches and high-risk vulnerabilities continue to dominate
Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …
Splunk App for Stream released
Splunk announced the availability of the Splunk App for Stream, which offers a new software approach for capturing real-time streaming wire data. The app is free for Splunk …
How fast can security pros detect a breach?
Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas. Industry research shows most breaches go undiscovered …
BYOD: 10 ways to fight back
The adoption of BYOD policies in SMBs means that IT has to protect devices that they didn’t even specify, procure or configure. In addition, most companies are now …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform