Help Net Security
Most popular prohibited IT activities in the workplace
In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …
Tips for secure mobile payments
With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …
Create a Wi-Fi hotspot anywhere
TP-LINK announced two new Portable Wireless N Routers, designed to provide high-speed Internet access anywhere you go. Both routers are ideal for connecting tablet computers, …
Solutions for inspecting and securing SSL traffic
Fidelis Security Systems announced the SSL Decoder within Fidelis XPS, which provides the ability to assess the authenticity of an SSL certificate. They also introduced the …
Changing nature of DDoS attacks
The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …
Personal electronic signatures for everyone
DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …
Change management leads to security breaches
75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …
Why do companies backup infrequently?
Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …
Teach children about online protection
In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …
nCircle PureCloud: Network security scanning service
nCircle announced PureCloud, a network security scanning service which combines security technology used by thousands of the world’s largest enterprises and government …
Mac OS X Lion: The Missing Manual
With Lion, Apple has unleashed the most innovative version of Mac OS X yet – and once again, David Pogue brings his humor and expertise to the #1 bestselling Mac book. …
Top requirements for operating data in the cloud
The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Survey. …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance