Help Net Security
Threats and protection issues of cloud data
Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …
Quantum cryptography theory has a proven security defect
Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …
GFI MailArchiver 2012 tackles email storage and data leakage
GFI Software announced the availability of GFI MailArchiver 2012 that offers new reporting capabilities to guard against data leakage of sensitive information, such as social …
New version of Palamida’s scanning solution for open source projects
Palamida recently announced Enterprise Edition 6, the latest edition of its open source intellectual property and vulnerability risk management product. The new version adds a …
The underground economy of social networks
In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some …
WatchGuard XTM 5 Series network security appliances released
WatchGuard released WatchGuard XTM 5 Series network security appliances. Appliance packet filtering increased nearly 40 percent, gateway antivirus is 190 percent faster, IPS …
USB with AES 256-bit hardware encryption
Enova Technology announced the Enigma module, a USB encryption solution designed to provide real-time full disk encryption for any USB mass storage class (MSC) drive. Key …
Critical Watch releases countermeasure recommendation engine
Critical Watch launched its ACI Recommendation Engine which consolidates multiple disparate data points into a unified view of risks. It’s designed to help close the gap …
CompTIA Network+ Certification Boxed Set
CompTIA Network+ Certification Boxed Set provides you with a variety of exam-focused, test-prep resources designed to work together as a comprehensive program for self-study. …
Week in review: MS-CHAPv2 cracked, Cybersecurity Act shot down, and modern day pirates
Here’s an overview of some of last week’s most interesting news and articles: Five steps for a secure cloud transition Almost every type of SMB is examining its …
Microsoft Attack Surface Analyzer 1.0 released
Attack Surface Analyzer is the same tool used by Microsoft’s internal product teams to catalogue changes made to the operating system by the installation of new …
Can big data analytics reduce cyber risk?
The Information Security Forum (ISF) has released a report that recommends proactive, preventative big data analytics for businesses that want to increase business agility, …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised