Help Net Security
Entrust IdentityGuard delivers mobile smart credentials
To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard …
Industry-by-industry cybercrime snapshots
Verizon released a series of industry-by-industry snapshots of cybercrime aimed at helping organizations better understand the anatomy of a data breach and how to best provide …
Top 10 strategic technology trends for 2013
Gartner highlighted the top 10 technologies and trends that will be strategic for most organizations in 2013. Gartner defines a strategic technology as one with the potential …
Protecting print devices from malware
Xerox and McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software, a filtering method …
TeamMentor: Secure software development knowledge base
Security Innovation released TeamMentor 3.2, a SaaS product that provides guidance to help security and development teams create secure software out of the box, along with …
LANDesk delivers secure user management suite
LANDesk Software announced LANDesk Secure User Management Suite, a solution aimed at helping IT professionals gain control of a mixed environment of users, devices and …
Cloud Security Alliance guidance for data ownership
The Cloud Security Alliance has incorporated in recently-released implementation guidance issued by the Security as a Service Working Group a set of recommendations for cloud …
Windows 8 Bible
Windows 8 is a new version of Microsoft’s flagship operating system and it’s packed with exciting new features. From the new Windows lock screen and the new …
Rackspace launches Cloud Block Storage, powered by OpenStack
Rackspace announced Cloud Block Storage, powered by OpenStack. This solution provides an approach to attached storage in the cloud by addressing customer demand for …
Top five tips for network protection
This year has seen a continued rise in targeted attacks and insider threats designed to steal confidential data. Nowadays, any organization that houses valuable intellectual …
Free dual-engine malware scanner
The free Emsisoft Emergency Kit 3.0 can detect and remove malware by simply starting it directly from a USB stick or CD without the need for installation. The kit comes with a …
Big data creates big jobs: 4.4 million IT jobs by 2015
Worldwide IT spending is forecast to surpass $3.7 trillion in 2013, a 3.8 percent increase from 2012 projected spending of $3.6 trillion, but it’s the outlook for big …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)