Help Net Security
Barracuda web filter adds social media controls
Barracuda Networks released Barracuda Web Filter Firmware 6.0, which adds support for more than 400 profiled applications beyond the scope of traditional URL or domain …
Open source NAC system PacketFence 3.5 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Total Defense launches mobile security for business
Total Defense launched the Total Defense Mobile Security Suite, a cloud based solution that delivers a wide range of security and management features to reduce the risks …
Large-scale open source public cloud powered by OpenStack
Rackspace announced the availability of cloud databases and cloud servers powered by OpenStack, along with a new control panel. The introduction of these open cloud products …
Security Automation Essentials
Security Automation Essentials lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline …
Application recovery challenges and how to address them
In response to such trends as growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational …
First SSDs with AES 256-bit hardware encryption
Memory and storage specialist Integral has launched Crypto SSD, its first range of SSDs to feature military-level, AES 256-bit hardware encryption. The new drives offer …
Modern day pirates
Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …
Risky password habit exposed
Over 70% of online users memorize the passwords they use to access secure websites rather than record them on paper or digitally according to a recent survey conducted by …
Insider threat in financial services sector
When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …
Fake products pose real dangers
It’s no surprise that many high-end luxury items, such as handbags and watches, have had its share of knock-offs over the years, mainly because they’re often …
IBM appliance controls social media risks
IBM announced a new class of network security appliance that delivers a more granular view of a company’s security posture and a simplified security management …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised