Help Net Security
CEOs lack visibility into seriousness of security threats
CORE Security exposed the division that exists between the CEO and Chief Information Security Officer (CISO), on how they view threats to IT Infrastructure security. The …
Free mobile security eBook from Veracode
Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …
Security tips to combat mobile device threats to healthcare
Mobile devices are increasingly exposing protected health information (PHI) in the healthcare space, with threat risks growing, according to the Department of Homeland …
Insider threat as prime security concern
Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …
nCircle automates new PCI DSS requirements
nCircle PureCloud automates the new internal vulnerability scan requirements included in the most recent update to the Payment Card Industry Data Security Standard (PCI DSS). …
Email encryption on iOS and Android
Voltage Security announced Voltage SecureMail Mobile Edition, a comprehensive program designed to extend data-centric security to a new generation of mobile devices. The …
Secure cloud file sharing for the enterprise
Varonis launched DatAnywhere, which extends the usability of corporate file sharing infrastructure to enable traditional file servers and NAS devices to behave like …
Tenable Security unveils Log Correlation Engine 4
Tenable Network Security announced the availability of Log Correlation Engine (LCE) version 4. By combining normalized log data from devices throughout enterprise networks …
Programming Microsoft’s Clouds: Windows Azure and Office 365
This book offers an in-depth look at a wide range of cloud topics. It explains how companies can easily scale their cloud use up and down to fit their business requirements. …
Growing security demands, old security infrastructure
SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …
ISO 22301: An overview of BCM implementation process
While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …
Global 2000 networks are vulnerable to Flame-style attacks
Venafi has aggregated scanning data from the networks of 450 Global 2000 enterprises and discovered how frequently MD5-signed certificates are deployed – and it is quite …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware