Help Net Security
Network security scanning and patch management
GFI LanGuard is a network security and vulnerability scanner which provides a complete network security overview, while also providing remedial action through its patch …
Key elements of an effective IT governance process
To successfully implement IT governance, chief information officers (CIOs) require both leadership and execution, according to Gartner. Great IT leaders master process, and …
Trend Micro expands risk management portfolio
Trend Micro announced new solutions for protecting enterprises from Advanced Persistent Threats (APT) known to evade conventional perimeter and content security. Today’s …
PCI Security Standards Council announces PCI awareness training
The PCI Security Standards Council announced that PCI Awareness online training is now available. An introductory level course, the four hour training is designed for anyone …
Web host victims repeatedly exploited by cybercriminals
More than one-third of respondents to an Anti-Phishing Working Group (APWG) survey were repeat victims of phishing attacks that resulted in a successful establishment of …
History and future of mobile malware
Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …
IRISS Conference 2011 call for papers
IRISS will hold its second annual conference on Wednesday the 23rd of November 2011 in Dublin. This is an all day conference which focuses on providing attendees with an …
AppSec adds blocking, virtual patching to database activity monitoring solution
Application Security announced new enhancements to DbProtect. Version 6.3 of this database security solution now includes the ability to block real-time attack and …
Week in review: LulzSec attacks, RSA admits compromise of SecurID tokens and new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: FBI affiliate organization hacked, user database leaked Only a day after they leaked …
Malware writers rely on users not updating
When infecting PCs, online criminals are increasingly benefiting from uninstalled updates for browsers and their components. Research carried out by G Data SecurityLabs …
Continued attacks on social networks
GFI Software announced the top 10 most prevalent malware threats for the month of May 2011. The month was marked by a number of Facebook survey scams baiting users with offers …
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised