Help Net Security
Cisco Certified Technician: New entry-level certification
Cisco introduced the Cisco Certified Technician (CCT) to its Career Certification Program. The CCT training and certification programs are designed for technicians who perform …
Cyber threat protection for enterprise networks
Damballa released Failsafe 4.2, an advance in detecting criminal command-and-control behavior in corporate networks. Failsafe pinpoints corporate assets under criminal …
CompTIA expands Security Trustmark Program
CompTIA expanded its Security Trustmark program to include two levels of the business accreditation, which identifies companies that follow industry-accepted best security …
Anonymous member charged with computer offences
Peter David Gibson, 22, has been charged with conspiracy to do an unauthorized act in relation to a computer, with intent to impair the operation of any computer or prevent or …
The importance of data de-identification in the risk assessment framework
Dataguise highlighted recent research and analysis showing that de-identification through data masking is an important aspect of a company’s overall risk assessment …
KillSwitch technology catches brute-force attacks
Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …
Windows 7 Inside Out
Windows 7 Inside Out, Deluxe Edition is updated with 300+ new pages of information for working with Windows 7. This comprehensive reference to Windows 7 packs hundreds of …
Have you been hacked this month?
I’m assuming the majority of people are sitting smugly reading this thinking “of course I haven’t!’ You do everything you’re supposed to do, …
PHP 5.3.8 fixes security issues
The PHP development team released PHP 5.3.8. This release fixes two issues introduced in the PHP 5.3.7 release: Fixed bug #55439 (crypt() returns only the salt for MD5) …
ICSA Labs to certify broadband home routers
Hackers are increasingly viewing home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program under …
Five mistakes companies make in their cloud strategies
When a company doesn’t fully define what the cloud can do for it, it leads to a less-than-optimized strategy that under serves the organization. To help IT pros avoid …
The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)