Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Tips for backups in virtual environments

With the rate of virtualized servers being added to IT environments, organizations are facing new challenges in how to adequately protect data and ensure its recoverability …

GSM cracking revelations are profound

Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves – apparently because …

Network intrusion detection for Amazon Web Services

Alert Logic announced the availability of Alert Logic Threat Manager and ActiveWatch for Amazon Web Services (AWS). AWS customers using Amazon EC2 interested in an added layer …

Smartphone security checklist

While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …

Confidential documents are leaving the workplace

90% of Americans believe people remove confidential documents from the workplace, even though most adults (79%) say taking confidential files outside the office is grounds for …

Cisco goes beyond BYOD

Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …

Protect data and automate log management

Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …

On-demand cloud identity management

Ping Identity unveiled PingOne, a multiplexed identity switch in the cloud. One connection to PingOne provides businesses the convenience of Tier 1 Single Sign-On (SSO) access …

BS 25999-2: An overview of BCM implementation process

While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …

The practice of insecure collaboration

Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …

Intel partners with StorageCraft for backup

StorageCraft Intel and StorageCraft have partnered to offer a Backup & Recovery (BDR) appliance, operating on the Intel Hybrid Cloud platform. The appliance protects an …

Unified web security solution from Blue Coat

Blue Coat Systems introduced its Unified Security solution that enables the extended enterprise to expand its secure perimeter to now include all users on devices across any …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools