Help Net Security
PostgreSQL security updates released
The PostgreSQL Global Development Group released security updates for all active branches of the PostgreSQL database system, including versions 9.1.4, 9.0.8, 8.4.12 and …
IBM releases software for developing secure mobile apps
IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …
CloudProtect: Insurance for cloud computing risks
To assist companies in managing the risks associated with cloud computing, Marsh announced an insurance solution designed to protect companies against first-party losses …
RDX media with built-in encryption technology
Imation announced the availability of Imation RDX Media Secure with CyberSafe Pro Security Technology, the first RDX media with built-in encryption and cryptographic erase …
Web Application Security, A Beginner’s Guide
Web Application Security, A Beginner’s Guide imparts the hard-learned lessons and experiences of top security professionals, and provides know-how that can otherwise …
Real-time mobile vulnerability management
Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the …
Passing the internal scan for PCI DSS 2.0
Merchants subject to Payment Card Industry Data Security Standard (PCI DSS) rules are often blindsided by DSS changes, arrival of new payment technologies, and newly emerging …
Consumers confused about data breaches
A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …
Siemens enhances security of industrial networks
Siemens announced new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 components with integrated security functions to enable companies to enhance the …
iOS app creates different personas on social networks
Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …
Information Storage and Management
Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …
Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems