Help Net Security
Majority of small businesses not confident in network security
More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …
VKernel announces integration support with Microsoft System Center 2012
VKernel released the integration compatibility between its vOPS Server product line and Microsoft System Center 2012. This integration adds capabilities to Microsoft System …
GFI Software launches cloud security and networking platform
GFI Software announced GFI Cloud, a platform for the delivery of cloud services via a Web-based user interface, accessible from anywhere with an Internet connection. …
Top skills for IT asset management leaders
The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and …
Major pitfalls involving vulnerability scanners
While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Targeted attacks focus on small businesses
36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …
Anti-theft Wi-Fi tag for laptops and tablets
Ekahau launched its newest Wi-Fi tag, the L4 Laptop tag. The L4 tag is a small flat unit designed to be plugged into the ExpressCard slot. The tag works with the Ekahau RTLS …
CompTIA Security+ Rapid Review
Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …
Microsoft releases nine security bulletins
The Microsoft Security Bulletin Summary for July 2012 contains nine security bulletins addressing 16 CVEs. Three of the bulletins are rated critical and the other six are …
Featured news
Resources
Don't miss
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised
- How CISOs can talk cybersecurity so it makes sense to executives