Help Net Security
Mobility management for Windows Phone 8
AirWatch unveils device and application management support for Windows Phone 8 devices. “With the introduction of the Nokia Lumia 920 and Nokia Lumia 820, partnerships …
Coverity Security Library released on GitHub
Coverity announced the creation of the Coverity Security Library, an open source project available through GitHub and Maven to help developers easily fix cross-site scripting …
Intel joins SAFECode
The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization exclusively dedicated to increasing trust in information and communications …
Open source NAC system PacketFence 3.6 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Red Hat Enterprise Linux 6 achieves top security certification
Red Hat Enterprise Linux 6, including the KVM hypervisor, has been awarded the Common Criteria Certification at Evaluation Assurance Level (EAL) 4+ – the highest level …
Privacy compliance laws: Why the European Commission finally got it right
The debate about privacy compliance has always been a heated one. Add to the mix new European Commission legislation and you have a recipe for not only a lively debate but …
Cloud Security Alliance released SIEM guidance
The Cloud Security Alliance (CSA) released the Security Information and Event Management (SIEM) guidance report as part of its Security as a Service (SecaaS) Implementation …
Service Bus for Windows Server released
Service Bus for Windows Server provides Windows Azure Service Bus messaging capabilities on Windows Server. It enables you to build, test, and run loosely-coupled, …
Privilege Guard 3.6 released
Avecto released Privilege Guard 3.6, which introduces a number of new features, including a challenge/response capability to easily authorize applications for remote users and …
Effective MySQL: Replication Techniques in Depth
Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …
Week in review: Windows 8 security features, weak crypto allowed spoofing emails from Google, PayPal domains
Here’s an overview of some of last week’s most interesting news and articles: Shortened .gov URLs lead to scams The fact that cyber crooks often misuse URL …
First look at Windows 8 security features
Windows 8 launched this week. It brings a new interface, but under the hood, it introduces a number of new security features. The most significant change in terms of security …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware