Help Net Security
Dedicated appliances for protection against DDoS
Fortinet introduced the FortiDDoS product family for enterprises, Web hosting and cloud service providers. The new FortiDDoS-100A, FortiDDoS-200A and FortiDDoS-300A are …
Network anomaly detection appliance by IBM
According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent …
First portable malware intelligence system
ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully …
Web application attack report from FireHost
Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients’ web applications and …
Russian cybercrime market doubles in size
Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page report prepared by analysts from its computer forensics …
BYOD is both an opportunity and a threat
A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …
Users worry about data security, but still trust social networks
Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential …
Enterprise encryption with near zero overhead
Vormetric announced Vormetric Encryption V5, which significantly reduces the cost and application impact of encryption by using software enhancements and hardware encryption …
Enhanced security awareness for tablet users
Cryptzone unveiled the latest release of NETconsent Compliance Suite, its policy management software. Recognising how difficult it is to raise IT security awareness amongst an …
Phishing and malware meet cheque fraud
Trusteer recently uncovered a scam in an underground forum that shows how data obtained through phishing and malware attacks can be used to make one of the oldest forms of …
SIEM and vulnerability management integration
LogRhythm and Qualys announced their partnership and the integration of LogRhythm’s SIEM 2.0 platform with Qualys’ QualysGuard Vulnerability Management (VM). The …
Businesses fail to learn from 2011 data breaches
While data breaches perpetuated during 2011 clearly demonstrated the need for more comprehensive encryption of business and customer data, a survey of over 170 IT managers …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)