Help Net Security
Secure data on Android devices with SecureZIP
PKWARE announced SecureZIP Reader for Android, an application that secures enterprise and government data. The SecureZIP Solution secures corporate information that end-users …
Common Vulnerability Reporting Framework updated
The Industry Consortium for Advancement of Security on the Internet (ICASI) announced Common Vulnerability Reporting Framework (CVRF), Version 1.1. Enhancements offer users a …
How executives understand and manage IT risks
Corporate boards and executives are taking risk management seriously but there is still a gap in understanding the link between IT risks and enterprise risk management, …
A marathon of holiday spam
The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Content-related threats cause significant data loss
Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …
Android security: Protection of Java and native apps
Arxan Technologies enhanced its Mobile Application Protection Suite to include multi-layered, end-to-end protection for Android applications. Given the open source nature of …
Cloud computing as key to improved data protection
More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …
IT is embracing BYOD
IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Manage Windows event logs with Event Log Explorer
FSPro Labs released Event Log Explorer 4, designed to view, monitor and analyze events recorded in Security, System, Application and other logs of Microsoft Windows operating …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface