Help Net Security
Non-native encrypted tape extraction
RenewData now offers the non-native extraction and restoration of encrypted tapes. With the addition of this capability, clients can react to legal matters or regulatory …
Widespread use of vulnerable open source components
Sonatype and Aspect Security collaborated on a study of the real-world use of vulnerable versions of open source libraries. Used by developers around the world, open source …
CCloud: Backup and sharing for Windows and Android
Comodo released a new edition of CCloud, a Windows client and a new CCloud app for Android. The Windows client now allows users to select the local drive letter that accesses …
Security main reason for stalled next generation data centre deployments
New survey results from Crossbeam identify network security as the number one reason IT organizations are stalled in their efforts to transition to cost- and energy-efficient …
Kaspersky PURE 2.0 Total Security released
Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection – …
Appliance for large-scale surveillance environments
Pivot3 announced the expansion of its vSTAC Watch product line with the introduction of the vSTAC Watch Enterprise, an enterprise-class Serverless Computing solution that …
AuthenTec combines fingerprint security with Symantec VIP
AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …
Next Level Security Systems releases mobile apps
Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …
Cisco and Lumos Networks prepare fiber infrastructure for 100G network
Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …
Open source audit plug-in for MySQL
McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …
New cloud disaster recovery service
EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …
Exploiting legitimate online technology
Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems