Help Net Security
Developing Enterprise iOS Applications
If you plan to develop iOS applications in a corporate setting – for internal consumption or for sale to end users – you need to read this book. Veteran developer …
New Ice malware attacking Facebook users
Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card …
Sophos acquires DIALOGS to provide mobile device protection
Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …
First 4TB enterprise hard drive
HGST introduced the first 4TB enterprise-class hard drive family, the Ultrastar 7K4000. As the only 4TB 7,200 RPM enterprise-class drive in the industry, and one with a 2.0 …
ISO 27001 implementation: How to make it easier using ISO 9001
ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …
Top concern? Mobile device vulnerability management
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …
New SDKs for biometric identification and object recognition
Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …
A walk through the expo at InfoSec World 2012
Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …
File transfer with end-to-end encryption
Steganos Software announced Elefile – a secure web-based file transfer solution that can be used on any computer or laptop without installing software. Created for …
UK enterprises fear EU Data Protection Act
The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its “EU General Data Protection …
Manage Linux and UNIX privileged access
BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, …
Cloud computing trends that will affect cloud strategy
Continual monitoring of cloud computing trends, with regular updates to the enterprise’s cloud strategy, will be essential to avoid costly mistakes or miss market …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous