Help Net Security
F-Secure keeps your apps, plugins and OS up-to-date
F-Secure has introduced Software Updater which offers patch management as a business security feature. Over 80% of the top 10 malware detected by F-Secure Labs are targeted …
Mobility management for Windows Phone 8
AirWatch unveils device and application management support for Windows Phone 8 devices. “With the introduction of the Nokia Lumia 920 and Nokia Lumia 820, partnerships …
Coverity Security Library released on GitHub
Coverity announced the creation of the Coverity Security Library, an open source project available through GitHub and Maven to help developers easily fix cross-site scripting …
Intel joins SAFECode
The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization exclusively dedicated to increasing trust in information and communications …
Open source NAC system PacketFence 3.6 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Red Hat Enterprise Linux 6 achieves top security certification
Red Hat Enterprise Linux 6, including the KVM hypervisor, has been awarded the Common Criteria Certification at Evaluation Assurance Level (EAL) 4+ – the highest level …
Privacy compliance laws: Why the European Commission finally got it right
The debate about privacy compliance has always been a heated one. Add to the mix new European Commission legislation and you have a recipe for not only a lively debate but …
Cloud Security Alliance released SIEM guidance
The Cloud Security Alliance (CSA) released the Security Information and Event Management (SIEM) guidance report as part of its Security as a Service (SecaaS) Implementation …
Service Bus for Windows Server released
Service Bus for Windows Server provides Windows Azure Service Bus messaging capabilities on Windows Server. It enables you to build, test, and run loosely-coupled, …
Privilege Guard 3.6 released
Avecto released Privilege Guard 3.6, which introduces a number of new features, including a challenge/response capability to easily authorize applications for remote users and …
Effective MySQL: Replication Techniques in Depth
Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …
Week in review: Windows 8 security features, weak crypto allowed spoofing emails from Google, PayPal domains
Here’s an overview of some of last week’s most interesting news and articles: Shortened .gov URLs lead to scams The fact that cyber crooks often misuse URL …
Featured news
Resources
Don't miss
- How to give better cybersecurity presentations (without sounding like a robot)
- Layoffs pose a cybersecurity risk: Here’s why offboarding matters
- Fake AI platforms deliver malware diguised as video content
- LockBit hacked: What does the leaked data show?
- May 2025 Patch Tuesday forecast: Panic, change, and hope