Help Net Security
Gap in patch priorities vs cybercriminal targets
Internet users are at risk from the rapid growth in software security flaws – specifically end-point vulnerabilities. Businesses should be doing far more to help …
Infosec pros maintain job stability
The information security profession offers not only stability but upward mobility, according to the 2012 Career Impact Survey released today by (ISC)2. Only seven percent of …
Cloud-based security of mobile devices via Active Directory
Centrify announced DirectControl for Mobile, a cloud-based service lets enterprises centrally secure and manage smart phones and tablets using existing Active Directory …
Real-time web and data security from Websense
Websense unveiled the X10G, a scalable system with real-time data-aware contextual defenses, which are applied to all inbound and outbound requests, and that defend against …
Microsoft Windows Operating System Essentials
Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …
Citrix releases open source cloud platform
Today Citrix announced the availability of Citrix CloudStack 3, the first release of the open source cloud platform under the Citrix brand. CloudStack is already the …
Kaspersky Lab unveils virtualization security solution
Kaspersky Lab announced Kaspersky Security for Virtualization, focused on protecting evolving corporate IT infrastructures from malware and cybercriminals. The solution …
Best practices for online banking security
There are two common misconceptions about online banking security which are holding financial institutions back from offering their customers the best services possible. …
Tax payers unaware of identity theft risks
While consumers remain concerned about identity theft, there are some common misconceptions about the risk of preparing and submitting their tax documents, and many are …
Mobile hacks to increase with SDR adoption
Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …
Storage migration without host and application downtime
Hitachi introduced a nondisruptive migration service capability that migrates from Hitachi enterprise storage to Hitachi Virtual Storage Platform (VSP) and eliminates host and …
Inside Cyber Warfare, 2nd Edition
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware