Help Net Security
Hadoop: The Definitive Guide, 3rd Edition
Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …
Week in review: Grum botnet shutdown, Android malware, and Madi Trojan targeting the Middle East
Here’s an overview of some of last week’s most interesting news, articles and reviews: How to make smart grids To prepare for a successful roll-out of smart grids, …
Privacy commitment key to selection of cloud providers
Attracted by the opportunity to improve efficiency while cutting IT costs, SMBs are adopting cloud computing, yet they continue to express concerns about privacy in the cloud, …
One in ten SMEs have suffered a data hack
One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …
Free tool diagnoses PC issues
Webroot System Analyzer is a fast way for IT professionals to analyze the security profile and performance of individual machines. This free PC-assessment tool scans system …
iPad app for enterprise single sign-on
OneLogin announced OneLogin for iPad which seamlessly extends OneLogin’s cloud-based identity access management solution, allowing mobile users to easily move from …
Software security guidance for Agile practitioners
SAFECode released a paper that provides practical software security guidance to Agile practitioners in the form of security-focused stories and security tasks they can easily …
Security risks facing the retail industry
Veracode is calling for the need for stronger controls in preventing large scale data breaches as security risks facing the retail industry are mounting. The appeal for …
Enterprise grade, secure mobile file sharing
Accellion announced the latest version of native Accellion Mobile Apps which allow business users to collaborate and view more than 200 different file types, editing and …
BYOD governance, security and privacy issues
Even IT professionals tasked with securing corporate data would be concerned about the privacy of their personal information if mobile device management (MDM) software were …
Trend Micro Mobile Security 8.0 released
Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …
Spear phishing targets one in two organizations
Proofpoint announced findings from a survey of security IT enterprise decision makers, about email and information security trends. Key findings include: Spear phishing is an …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous