Help Net Security
Explore what ISO 27001 documentation looks like
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better while poorly written …
Free web service identifies Internet abuse
Zscaler released IPAbuseCheck, free web service which will allow them to query a dynamic ThreatLabZ database to identify whether any of their endpoint clients and IP addresses …
Customizable cloud service with hybrid options
Contegix announced an expansion to MiraCloud, its cloud computing platform. It will offer a tiered cloud hosting model that includes convenience class, business class and …
Security testing to become part of education in Germany
Codenomicon and Brandenburg University of Applied Sciences (FH Brandenburg) announced a cooperation agreement to help educate German IT professionals. Codenomicon’s …
Security for virtualized environments
Bitdefender announced the commercial availability of an integrated security solution for VMware vShield 5 virtualised datacenters. Security for Virtualized Environments …
Duqu: The next tale in the Stuxnet files
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is that the Stuxnet team …
Cisco expands data center networking portfolio
As Internet traffic volumes increase at exponential rates (by 2013 it’s predicted that there will be 56 exabytes crossing the internet per month) the data centers that …
McAfee detects kernel-mode malware
McAfee announced Deep Defender, which is capable of detecting nearly all kernel-mode malware. This level of security is possible with McAfee DeepSAFE technology because its …
Shinken: IT system and application monitoring
Shinken can monitor all IT from systems to end user applications. In case of a failure, it can alert the operation engineers so they can repair it. It has the same …
Fingerprint sensors for mobile ID devices
DigitalPersona launched a new generation of biometric fingerprint sensors designed specifically for the growing market of battery-powered mobile identification devices. The …
WatchGuard unveils new line of virtualized firewalls
WatchGuard is extending its line of UTM appliances to the virtual world. Designed for a VMware hypervisor environment, the new WatchGuard XTMv series of virtual firewalls …
Twitter protects freedom of speech and privacy of users
When LulzSec member Sabu recently answered a lot of questions on an impromptu Q&A session on Reddit by posting the answers on his Twitter account, he was asked why he …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware