Help Net Security
Cloud-based document security from SealPath
SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …
Seagate unveils three new enterprise-class HDDs
Seagate announced three new enterprise-class hard disk drives optimized for traditional data centers and emerging cloud infrastructures. Perfect for cloud bulk data storage, …
Fortinet unveils FortiOS 5.0 operating system
Fortinet announced FortiOS 5.0, a security operating system that is the foundation for all Fortinet FortiGate integrated security platforms. This new release provides more …
Everyday Cryptography: Fundamental Principles and Applications
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …
Most people want control of information collected by data brokers
As Congress examines how data brokers collect, aggregate and share consumers’ personal information, a new survey by TrustedID shows that most people are confused about …
Multi-dimensional analytics tool for big data
LogRhythm announced the enhancement of its SIEM 2.0 Big Data security analytics platform with the industry’s first multi-dimensional behavioural analytics. Leveraging …
Bloxx launches VMware virtual appliance
Bloxx released virtual appliance versions of its Web Filter and Secure Web Gateway. The virtual appliances have identical functionality to the current hardware appliances, …
GFI Software unveils VIPRE SDK for Windows
GFI Software announced the availability of VIPRE 6.0 SDK (for Windows environments) adding several new security features that software developers, PC utility providers and …
Malware targeting Skype missed a trick
Last week reports came out stating that the Dorkbot worm is now targeting Skype users. The worm fools users into downloading the malware, whose payload locks down machines. …
Hack In The Box celebrates a decade of security conferences
Last week’s Hack In The Box Security Conference saw the return of over 40 of the most popular speakers from the last decade presenting in a triple track format over 2 …
How to get promoted in IT security
Not only has landing a job become more difficult; it’s also getting harder to get promoted once you have the job. Here are some tips to getting ahead in today’s …
Network complexity causes security incidents
Complex network security policies, such as those found in multi-vendor environments, are directly related to system outages and security breaches, according to AlgoSec. The …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online