Help Net Security
Belkin to acquire Cisco’s home networking business
Belkin has entered into an agreement to acquire Cisco’s Home Networking Business Unit, including its products, technology, Linksys brand and employees. …
New Cisco certifications validate Video-Voice-over-IP skills
Highlighting the increasing use of high-quality video traffic over the network, Cisco announced the release of the Cisco CCNA Video and Cisco Video Network Specialist …
Security intelligence solutions for mobile technology providers
Webroot announced the availability of a portfolio of internet security solutions that give mobile technology providers – from carriers to device manufacturers to mobile …
CISSP Rapid Review
Assess your readiness for the CISSP Exam—and quickly identify where you need to focus and practice. CISSP Rapid Review is a practical and streamlined guide which provides …
Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes …
Infoblox unveils new solutions for security, availability and automation
Infoblox announced new products enable organizations to manage the demands put on their networks by BYOD, cloud computing, migration to IPv6 and the evolving cyber-threat …
Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems. It covers hardware by showing how to …
IT challenges with managing increasing amounts of data
Half of all organizations EVault surveyed in the USA, UK, France, Germany, and the Netherlands say they are managing more data now than they were a year ago, and 70 percent of …
People need help controlling personal info online
Microsoft released new data reflecting consumers’ perceptions about how their information is used online and a new series of short videos to help people better manage …
RSA introduces disaster recovery and crisis management solution
RSA, the Security Division of EMC, introduced two additions to its RSA Archer product suite designed to help customers meet ever changing and comprehensive business …
The arrival of the post-PC threat era
With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …
Most exploit kits originated in Russia, say researchers
58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems