Help Net Security
Cloud provider assurance: Trust but verify
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and cloud privacy and compliance …
Voter database security is a myth
Some of us spend days and months of indecision, hours in front of the TV watching campaign commercials and presidential debates, researching on the Net, mulling the options …
5 tips for effective disaster recovery
David Mount, technical director at NetIQ, has highlighted 5 tips that will help businesses implement effective disaster recovery plans for their all important IT assets. Am I …
One-click security within Microsoft Outlook
CertiVox launched an automatic, end-to-end encryption capability designed specifically to enable government, businesses and individuals to benefit from one-click security …
RSA helps thwart smash-and-grab credential theft
At RSA Conference Europe 2012 in London, RSA introduced a new technology designed to protect passwords and other credentials and secrets stored in databases from cyber …
Security as an enabler of innovation
For years, many enterprises have viewed IT security as a costly extra that has to be endured as a way to reduce risk, without providing any other value to the business. Recent …
Constant connectivity to social networks goes hand-in-hand with malware
In September, GFI threat researchers documented a number of cybercrime campaigns directed at users of various social networking sites including direct message spam on Twitter …
Free mobile app profiler for risk assessment
At RSA Conference Europe 2012, Zscaler announced the results of an analysis from ThreatLabZ which reveals that up to 10 percent of mobile apps expose user passwords and login …
HyTrust prevents virtual data center and audit failures
HyTrust released HyTrust Appliancev3.0 which includes a Secondary Approval feature that is designed to prevent risk, whether caused by unintended or malicious actions, to VMs, …
Mounting risks from mobile devices in the enterprise
At RSA Conference Europe 2012, RSA released a new research report from the Security for Business Innovation Council (SBIC) that addresses the continued surge of consumer …
Array Networks unveils secure access gateway virtual appliance
Array Networks announced its new vxAG Virtual Secure Access Gateway virtual appliance for cloud and virtualized environments. The new product gives enterprises and service …
Rapid7 acquires Mobilisafe
Rapid7 has acquired Mobilisafe, a Mobile Risk Management (MRM) provider, and entered a new market with its solution for managing the risk associated with Bring Your Own Device …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)