Help Net Security
Full-disk encryption with wireless pre-boot authentication
WinMagic launched SecureDoc Version 5.3, which adds wireless capabilities to its PBConnex pre-boot network authentication. SecureDoc v5.3 will also introduce two other key …
Malware extraction and analysis by Solera
Solera Networks announced the latest enhancement to its DeepSee platform – the Real-Time File Extractor, which enables immediate, automatic identification and alerting …
A walk through the expo at RSA Conference 2012
The much anticipated expo at RSA Conference 2012 today opened its doors in great style. Here’s the first of several galleries we’ll have from the show. For …
We are at another inflection point, says Microsoft
At the RSA Conference 2012, Scott Charney, corporate vice president of Microsoft Trustworthy Computing, shared his vision for the road ahead as society and computing intersect …
Security for MySQL and Teradata databases
McAfee announced its new McAfee Database Activity Monitoring solution offering reliable, real-time protection for business-critical databases. The solution enables …
Firewalls for service providers and carriers
Fortinet announced two additions to its next-generation firewall product family that are designed to meet the growing threat protection and IT infrastructure control …
Protection against malicious URLs and attachments
Invincea announced the availability of a greatly expanded product suite to address emerging vectors of attacks against users. Building off of its approach to breach prevention …
Desktop isolation technology for secure browsing
OPSWAT announced the launch of Secure Virtual Desktop (SVD), a new desktop isolation solution that protects users and organizations from data loss by creating an isolated …
Researchers work on self-healing cloud infrastructure
Cloud computing has become completely ubiquitous, spawning hundreds of new web based services, platforms for building applications, and new types of businesses and companies. …
Automated managing of enterprise assets
Qualys announced the availability of hierarchical Dynamic Asset Tagging for its QualysGuard Cloud Platform and suite of applications for security and compliance. The …
Only 34% of businesses enforce encryption on removable devices
Imation revealed the results of a recent survey of 302 IT decision makers in the US and Canada, which say that 37 percent of them reported that their business had …
A platform to stop APTs and malware
Bit9 announced the Bit9 Advanced Threat Protection Platform that protects all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025