Help Net Security
Secure hardware storage encryption from SafeNet
SafeNet extends its comprehensive portfolio of data security solutions into the storage security market with StorageSecure, a NAS security solution developed in partnership …
From identity and access solutions to access governance
The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …
Military-grade encryption for Android devices
AuthenTec introduced a new security offering that provides military-grade encryption to data stored on Android smartphones and tablets. MatrixDAR helps bring Android devices …
OkayFreedom: VPN solution for private surfing
Steganos Software announced OkayFreedom, a VPN service enabling Internet users to privately and securely surf all Web content, regardless of their location. Designed for …
Developing and Hosting Applications on the Cloud
In this book, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on …
Week in review: Shamoon attacks, automated hacking, Assange granted asylum in Ecuador
Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos and articles: Scientists create algorithm for tracking down sources of …
Provisioning is not access governance
Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …
Fluke Networks adds remote analyzer capability to wireless LAN tools
Fluke Networks announced a new remote analysis capability for its portable WLAN tools, making them the first to enable both real-time troubleshooting and spectrum analysis of …
Programming Computer Vision with Python
If you want a basic understanding of computer vision’s underlying theory and algorithms, this hands-on introduction is the ideal place to start. You’ll learn …
Tips to keep kids safe online
Malware is just a step-away when children click on games, free shoes, Justin Bieber videos or gift cards offered on social networks. Hackers use social engineering techniques …
Sharp rise in malware targeting Android
The number of new malicious programs targeting the Android platform has almost tripled in the second quarter of the year, according to Kaspersky Lab. Over the three months in …
Top mobility challenges facing C-level executives
Mre than fifty percent of the companies surveyed are now planning Mobile Productivity projects to allow employees to access, sync and share documents using mobile devices, …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware