Help Net Security
Financial fraud drives most targeted attacks
Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …
Tips for a unified records management approach
While an increasing number of companies have one policy for handling paper documents and electronic files, the pervasive growth of new record sources like Twitter, wikis and …
Cloud based SaaS solution for Web and email protection
Total Defense launched Total Defense Cloud Security, an integrated cloud based SaaS solution for Web and email protection which provides organizations with a powerful and …
Panasonic delivers secure video evidence capture
Panasonic introduced its Wearable Video Camera system. The new solution, designed for law enforcement officers in the field, will provide agencies with a comprehensive system …
How digital economy is changing the world
Unzipping the Digital World is a new book by Keith Willetts that captures a lifetime of his experience in the communications and software world and gives an eye-opening view …
Trojan stealing money in German online banking scam
Trusteer came across a complex new criminal scheme involving the Tatanga Trojan that conducts an elaborate Man in the Browser (MitB) attack to bypass SMS based transaction …
BYOD adoption is growing despite security concerns
While organizations are taking considerable steps towards BYOD adoption, network and bandwidth issues remain significant barriers for many. The Aruba survey found that 69 …
What security wants most from Big Data
More than two thirds of IT people think Big Data should be a strategic priority, according to Varonis. More than half expect Big Data to be a strategic initiative over the …
EMC acquires Syncplicity
EMC has acquired privately held Syncplicity, a provider of native cloud-based sync and share capabilities required by enterprise customers. Terms of the transaction were not …
SaaSID launches Cloud Application Manager
SaaSID unveiled Cloud Application Manager (CAM), security software that provides single sign on (SSO), application shaping and auditing of any applications accessed using a …
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Nmap 6 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware