Help Net Security
Password security, one step at a time
Last week we saw millions of passwords leak from LinkedIn, eHarmony and Last.fm. Much has been written over the last twenty years about how to create strong passwords, but no …
PCI compliance scan for Google Drive
CloudLock announced a pattern matching engine that identifies, classifies, and secures sensitive information, including Personally Identifiable Information (PII), PCI data and …
The rise of the private cloud
More than half of North American cloud service providers (CSPs) reported that their customers are opting for the private cloud services model, while 32 percent are choosing …
One-click backup for Facebook and Flickr
Seagate introduced Backup Plus storage devices with one-click backup and the ability to save and share your content on Facebook and Flickr. Seagate Backup Plus hard drives …
Prevent metadata leaks with Metadacte 2.0
Litera released Metadacte 2.0, allowing companies to prevent metadata leaks, including information sent from mobile devices. Key new features include the ability to clean …
Implications of the rise of mobile devices
CIOs and IT leaders must address three key implications of the “post-PC” era, as workforces and consumers increasingly access IT applications and content through …
Dell SecureWorks unveils new managed security services
Dell SecureWorks announced the delivery of several new managed security services for enterprises looking to achieve greater ROI and efficiency on their security infrastructure …
Microsoft fixes 28 security bugs
The Microsoft Security Bulletin Summary for June 2012 contains 7 bulletins addressing 28 security bugs. Three of the bulletins are rated “critical” and the rest …
Five IT security threats and how to combat them
Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the …
Static analysis technology for web application security
Coverity has extended static analysis to deeply understand both source code and modern web application architecture, providing greater accuracy and remediation guidance to …
Mobile workspace offers a secure Windows OS on any computer
Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business …
McAfee enhances its cloud security platform
The McAfee Cloud Security Platform provides a framework that allows organizations to extend their security and policy enforcement into the cloud by securing the three primary …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware