Help Net Security
What CISOs must learn from Bitcoin and a research team at Georgia Tech
It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. …
Free eBook: First Aid Kit for Sys Admins
Have you faced any of these situations: malware infection, cracked passwords, defaced website, compromised DNS, licensing violations, stolen hardware and other issues which …
Secure mobility assessment tool
Mobile Work Exchange, a public-private partnership focused on demonstrating the value of mobility and telework, launched the Secure Mobility Hot Zone, which includes a …
SolarWinds Server & Application Monitor 6.0 released
SolarWinds released SolarWinds Server & Application Monitor (SAM) 6.0, designed to deliver agentless performance and availability monitoring, alerting and reporting for …
Week in review: Backdoored NIST standard revealed, Java’s new whitelisting feature, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: How important is penetration testing? With cyber attacks becoming the norm, it is …
US Internet users less vigilant than ever about their online safety
As the Internet has become a ubiquitous part of life, US consumers are less vigilant about protecting their safety online, says this year’s Microsoft Computing Safety …
IT pros lack support to manage security intelligence
SolarWinds, in conjunction with SANS, today released the results of a security survey of more than 600 IT professionals representing a broad range of industries and …
Medical identity theft affects 1.84 million U.S. victims
Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted …
Most companies choose on-premise private cloud deployments
87 percent of IT professionals currently leveraging private cloud solutions indicate that their companies host clouds on-premises rather than with third-party providers, …
Tenable release Passive Vulnerability Scanner 4.0
Tenable Network Security’s Passive Vulnerability Scanner (PVS) 4.0 is now generally available as a standalone product. Already available as part of Tenable’s …
Safeguard your info and monitor Facebook activity with BullGuard Identity Protection
BullGuard released BullGuard Identity Protection, a new suite of security tools designed to guard against the growing number of threats that target internet and social media …
Military-grade solution to protect industrial control systems
Organisations will now be able to bring their industrial control systems technology into the modern era and realise the benefits of increased connectivity while also reducing …
Featured news
Resources
Don't miss
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”