Help Net Security
Protect data and automate log management
Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …
On-demand cloud identity management
Ping Identity unveiled PingOne, a multiplexed identity switch in the cloud. One connection to PingOne provides businesses the convenience of Tier 1 Single Sign-On (SSO) access …
BS 25999-2: An overview of BCM implementation process
While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …
The practice of insecure collaboration
Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …
Intel partners with StorageCraft for backup
StorageCraft Intel and StorageCraft have partnered to offer a Backup & Recovery (BDR) appliance, operating on the Intel Hybrid Cloud platform. The appliance protects an …
Unified web security solution from Blue Coat
Blue Coat Systems introduced its Unified Security solution that enables the extended enterprise to expand its secure perimeter to now include all users on devices across any …
Packet Guide to Routing and Switching
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. …
Week in review: Multifunction printer hacking, new protection mechanisms for IE 10 and most notorious Android malware
Here’s an overview of some of last week’s most interesting news, podcasts, articles and reviews: Multifunction printer hacking In this podcast, Deral Heiland talks …
Most notorious Android malware
Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …
Are mobile password apps pointless?
ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …
Middle East plans to build a cyber-stronghold
The risks and consequences of cyber-attacks are increasing exponentially each day. The computers that control most of the world’s oil and gas production and distribution …
Wi-Fi hotspot testing simplified
Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025