Help Net Security
Top 5 authentication predictions for 2012
Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …
Cloud computing certification
With the use of cloud computing expanding and the demand for IT workers with cloud skills growing, CompTIA introduced a new specialty certification focused on cloud computing …
Virtualization can transform data protection
According to a Vanson Bourne survey of 500 CIOs virtualization has the potential to transform data protection. In order to achieve this, greater strides need to be made in …
Mobile VPN client for Android
Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …
Microsoft patches 19 vulnerabilities
For the December Patch Tuesday, Microsoft released thirteen security bulletins that fix vulnerabilities targeting Windows, Internet Explorer, and Office. Three are marked as …
The multiple dimensions of corporate espionage
You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …
Confidential data exposure in public spaces
While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal …
Top software failures of 2011
SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to …
Holiday travel is risky business for mobile devices
The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …
NETGEAR router with Mac features
NETGEAR announced Wireless Extreme for Mac and PC (WNDRMAC), the company’s first home router to offer Mac-specific capabilities – including native support for …
Managing firewalls in virtual environments
AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …
The risks of unauthorized access
HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?