Help Net Security
HP introduces intelligent security solutions
HP announced additions to its security solutions portfolio that enable enterprises to assess, transform, optimize and manage their security environments. Cloud, mobility and …
Social networking protection from Trend Micro
Trend Micro released Trend Micro Titanium Internet Security 2013, a new family of security software that promises to consumers “Protection Made Easy” combining …
PostgreSQL 9.2 improves performance and scalability
With the addition of linear scalability to 64 cores, index-only scans and reductions in CPU power consumption, PostgreSQL 9.2 has improved scalability and developer …
Hosted mobile device management solution from Sophos
Sophos announced the hosted version of its mobile device management (MDM) solution, Sophos Mobile Control, which allows businesses to deploy an MDM solution without any …
D-Link releases outdoor cameras with cloud services
D-Link introduced the new D-Link DCS-7010L high-definition outdoor mini bullet camera with integrated cloud services support and the D-Link DCS-7513 two-megapixel outdoor …
Windows 8 Secrets
Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally …
New program offers pathway into cyber security field
(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future. The pilot stage of the program will …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Data breaches expose 94 million records in the government sector
An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 …
87% have something to hide on their smartphones
When it comes to the almost weekly reports of celebrity phone hackings and leaks, more than half of consumers believe these are merely stunts to garner publicity. In the end, …
AlgoSec enhances firewall policy management suite
AlgoSec announced version 6.3 of its Security Management Suite, which simplifies the operational and security challenges of managing firewall policies. The suite pffers …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks