Help Net Security
Data mapping and masking requirements
A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …
Data loss management SaaS
Co3 Systems announced an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more …
When scammers socialize
A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …
Security case for iPhone 4
BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
65% of security pros say SIEM is dead
Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …
phpMyAdmin multiple script insertion vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
Desktop virtualization approaching tipping point
Cost reduction, security, manageability and simplifying the migration to Windows 7 are driving organizations to adopt an aggressive deployment approach when it comes to …
Majority of small businesses unprepared for data disaster
Although small businesses recognize the impact data loss could have on their business, more than half (57 percent) do not have a disaster preparedness plan for business data. …
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of …
Cloud service for secure managed file transfer
Cyber-Ark Software announced Inter-Business Vault as a Service, a cloud-based solution for rapidly exchanging sensitive files with external third parties. Based on its …