Help Net Security
GFI WebMonitor 2015 Beta 1 released
Beta 1 of a totally revamped GFI WebMonitor is now available for preview. GFI WebMonitor 2015 is a new, powerful version that really gives sysadmins the tools to manage …
Data breaches and high-risk vulnerabilities continue to dominate
Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …
Splunk App for Stream released
Splunk announced the availability of the Splunk App for Stream, which offers a new software approach for capturing real-time streaming wire data. The app is free for Splunk …
How fast can security pros detect a breach?
Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas. Industry research shows most breaches go undiscovered …
BYOD: 10 ways to fight back
The adoption of BYOD policies in SMBs means that IT has to protect devices that they didn’t even specify, procure or configure. In addition, most companies are now …
IBM acquires Lighthouse Security Group
IBM has acquired the business operations of Lighthouse Security Group, a cloud security services provider. Based in Lincoln, Rhode Island, Lighthouse Security Group offers the …
Only 1 in 100 cloud providers meet proposed EU Data Protection requirements
The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from Skyhigh Networks, suggests that only 1 in 100 cloud …
Detect and respond
At a recent security and risk management conference I had an opportunity to talk with industry analysts about today’s challenges in network security. It seems that many …
Critical 0-days found in CPE WAN Management Protocol
Check Point has released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069) deployments, used by major ISPs globally to control business and …
Week in review: 1.2B Web credentials stolen, Google Search prioritizes HTTPS websites, and how to foil SynoLocker
Here’s an overview of some of last week’s most interesting news, articles and interviews: How secure are today’s critical networks? In this interview, Dr. …
Serious flaws in cell phone carrier control software found
At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …
End-to-end encryption hardware for unsecure networks
x.o.ware has debuted the ExoNetTM VPEx Gateway and its companion product, the ExoKey Secure Communications Extension, this week at Black Hat USA 2014. These two new products, …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down