Help Net Security
Enterprise account manager with double safekeeping feature
Double safekeeping, or the two-man rule, has long been an established control mechanism for ensuring high levels of security during critical operations because the process …
Qualys executives and researchers at RSA Conference 2013
Here’s a complete list of what Qualys executives and researchers will present during RSA Conference 2013, taking place this week in San Francisco. The Hyperconnected …
Pwn Pad: A tablet for penetration testers
At the RSA Conference 2013 in San Francisco, Pwnie Express released the Pwn Pad, a tablet loaded with wired and wireless pentesting tools. The Pwn Pad contains bleeding edge …
A framework for building privacy-oriented apps
At the RSA Conference 2013 in San Francisco, SpiderOak announced it is launching privacy into the mainstream with the unveiling of Crypton, a “zero-knowledge” …
Week in review: Facebook, Apple hacks, APT1, and mobile phishing
Here’s an overview of some of last week’s most interesting news, reviews and articles: Facebook employees ambushed by zero-day exploit Facebook has admitted that …
Real world social engineering challenge at HITBSECCONF2013
Global IT services provider Sogeti will launch their social engineering challenge during the Hack In The Box Amsterdam conference in April. The challenge will be to social …
Hidden security threats on enterprise networks
Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …
Silent Text iOS app can auto-delete sent messages
Silent Circle announced features in the company’s updated Silent Text secure messaging app for iOS. Customers can now: Send private encrypted messages and use Silent …
IBM shows where vulnerabilities appear in iOS apps
IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …
ESET releases two-factor authentication software solution
ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …
IS Decisions releases FileAudit 4
IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and …
Citrix introduces XenMobile MDM
Citrix announced XenMobile MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance …
Featured news
Resources
Don't miss
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
- Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
- Product showcase: Go beyond VPNs and Tor with NymVPN
- CISOs must speak business to earn executive trust