Help Net Security
35% of businesses experienced a DDoS attack in 2012
When DDoS attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the …
Data breaches increase IT budgets
Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …
Hosted virtual desktops can increase security
One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …
Software for complex Android device security needs
Wind River has introduced three Solution Accelerators for Android Security that allow developers to quickly begin working on security requirements for Android-based devices. …
GFI Software adds patch management to GFI Cloud
GFI Software announced the addition of patch management capabilities to its cloud-based platform for the delivery of services via a web-based user interface. Small to …
New professional certification for cloud security
(ISC)2 and the Cloud Security Alliance (CSA) have signed an agreement to collaborate on a new professional certification for information security. The combined initiative will …
Ubuntu Server 13.04 released
Canonical today announced that Ubuntu Server 13.04 is available for download, featuring high-availability (HA) for OpenStack. “Ubuntu is built for hyperscale and is the …
Photos: Security BSides London 2013
Security B-Sides events are free, community events organised by local individuals, with the express goal of enabling a platform for information dissemination. This …
Cyber attacks on trust expose companies to millions in losses
Every large UK business is open to £247million in possible threat exposure due to a lack of control over cryptographic keys and certificates, the foundation of trust in …
Secured privileged accounts reduce APT exposure
Organizations can reduce the threat of targeted attacks by proactively securing privileged accounts, according to CyberSheath. The theft, misuse and exploitation of privileged …
Adults taking online password security risks
UK adults are risking their online security by using identical or easy to remember passwords on the websites they visit, new Ofcom research reveals. More than half (55%) of …
Free tool to identify risks in secure shell environments
SSH Communications Security, the inventor of the Secure Shell and SFTP protocols, today announced the launch of SSH Risk Assessor (SRA), a free tool that provides users with a …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?