Help Net Security
Security system for trust of data in the cloud
Porticor introduced the latest release of its Virtual Private Data (VPD) system, which protects cloud data while stored and in use, delivering total security to cloud …
Secures data in dormant virtual machines
PKWARE announced vZip, a software application that secures and reduces sensitive data within dormant virtual machines. With vZip, organizations eliminate costs related to …
Automate security policy management for business applications
AlgoSec announced BusinessFlow, a new product that automates security policy management for business applications and provides the link between application connectivity …
Gang steals over $1M by exploiting Citigroup e-payment flaw
Fourteen individuals were charged following a FBI-led investigation into the theft of over $1 million from Citibank using cash advance kiosks at casinos located in Southern …
Application Security updates its database scanning tool
Application Security announced the latest release of its database scanning tool, AppDetectivePro. Expanded capabilities and a new user interface provide security, risk and IT …
Secunia Vulnerability Intelligence Manager 4.0 released
The Secunia VIM 4.0 covers more than 40,000 software systems and applications. Its provides intelligence about software vulnerabilities available to organizations, ensuring …
EMC to acquire Silver Tail Systems
EMC has signed a definitive agreement to acquire Silver Tail Systems, a provider of real-time web session intelligence and behavioral analysis. Terms of the deal were not …
Interactive CERT map from ENISA
ENISA has published a new interactive CERT map and Inventory of CERT’s activities in Europe containing publicly listed teams and co-operation, support and …
Trojan Horse: A Novel
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …
Splunk Enterprise 5 released
Splunk announced Splunk Enterprise 5, which includes added features to create a powerful platform for developers building big data applications. “Even as data volume and …
Inside the black market for social network fraud
In its analysis of a large hacker forum containing roughly 250,000 members, Imperva detected a black market for social network fraud. In addition, about one third of …
Rugged Android device with secure communication
Cummings Engineering, in partnership with Ascent Rugged Mobile, is launching SAIFE Defender, a commercial rugged Android device with secure digital communications. SAIFE …
Featured news
Resources
Don't miss
- How to give better cybersecurity presentations (without sounding like a robot)
- Layoffs pose a cybersecurity risk: Here’s why offboarding matters
- Fake AI platforms deliver malware diguised as video content
- LockBit hacked: What does the leaked data show?
- May 2025 Patch Tuesday forecast: Panic, change, and hope