Help Net Security
Automatic and non-disruptive data migration
Varonis Systems announced Varonis Data Transport Engine (DTE), the newest family member of its Data Governance Suite, which solves how to securely move and archive data, …
Largest malware rise in four years
McAfee found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5 million increase in malware since Q1 2012 and identified new …
A Practical Guide to Fedora and Red Hat Enterprise Linux, 6th Edition
An increasing number of advanced users are drawn to open source solutions as an alternative to Microsoft Windows. The popular free Linux distribution Fedora and it's big …
76% of IT pros in the dark about unauthorized application downloads
While IT professionals recognize the dangers that unauthorized applications cause to their networks, most are letting these dangers go unnoticed, according to a survey by …
Static analysis tool for C and C++
GrammaTech announced CodeSonar 3.8, a static analysis tool for C and C++. Improvements in CodeSonar 3.8 include: Faster analysis that takes full advantage of multi-core …
Server network virtualization acceleration technology for VXLAN implementations
Broadcom announced its NetXtreme II server network virtualization (NV) acceleration technology for VXLAN implementations, improving server performance by more than 55 percent. …
Networkless working: The future of the public sector?
It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …
The top Internet dangers for kids
As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …
Network Management: Principles and Practices, 2nd Edition
Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …
Week in review: Java 0-day finally patched, and fast and furious reverse engineering
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Preparing for your first security breach
So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised