Help Net Security
Pano Logic expands desktop computing platforms
Pano Logic announced Pano System for Cloud/Terminal Services 2.0, which links cloud-based computing with legacy terminal services resources, easing migration to the cloud. …
Automatic and non-disruptive data migration
Varonis Systems announced Varonis Data Transport Engine (DTE), the newest family member of its Data Governance Suite, which solves how to securely move and archive data, …
Largest malware rise in four years
McAfee found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5 million increase in malware since Q1 2012 and identified new …
A Practical Guide to Fedora and Red Hat Enterprise Linux, 6th Edition
An increasing number of advanced users are drawn to open source solutions as an alternative to Microsoft Windows. The popular free Linux distribution Fedora and it's big …
76% of IT pros in the dark about unauthorized application downloads
While IT professionals recognize the dangers that unauthorized applications cause to their networks, most are letting these dangers go unnoticed, according to a survey by …
Static analysis tool for C and C++
GrammaTech announced CodeSonar 3.8, a static analysis tool for C and C++. Improvements in CodeSonar 3.8 include: Faster analysis that takes full advantage of multi-core …
Server network virtualization acceleration technology for VXLAN implementations
Broadcom announced its NetXtreme II server network virtualization (NV) acceleration technology for VXLAN implementations, improving server performance by more than 55 percent. …
Networkless working: The future of the public sector?
It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …
The top Internet dangers for kids
As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …
Network Management: Principles and Practices, 2nd Edition
Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …
Week in review: Java 0-day finally patched, and fast and furious reverse engineering
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware