Help Net Security
New threats require multiple layers of defense
Consumers can expect to receive many more notices – similar to those sent by companies that had used the Epsilon marketing service – in the months ahead from …
Embed strong authentication into mobile applications
To improve the speed and efficiency in which financial institutions develop and provide customers secure, trusted mobile banking applications, Entrust announces their …
Seagate unveils first hard drive with 1TB per platter
Seagate unveiled the world’s first 3.5-inch hard drive featuring 1TB of storage capacity per disk platter, breaking the 1TB areal density barrier. Seagate’s GoFlex …
Osama bin Laden Twitter witness’ site hacked
Cyber criminals will jump at any chance and use any news to spread malware, and news doesn’t get much bigger right now than the death of Osama bin Laden. It was obvious …
Creating a secure firewall policy for a large company
When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …
Osama bin Laden spam invades Facebook
I guess the news about the death of Osama bin Laden is starting to reach everyone around the world. Every time something big as this happens, people get curious and start …
Network metering and forensics tool Trisul gets new UI
Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …
Secure Belkin keyboard-video-mouse switch
Belkin released its new line of Advanced Secure Keyboard-Video-Mouse (KVM) switches that provide a host of new features, including innovative data path isolation. The new …
OpenBSD 4.9 released
OpenBSD 4.9 is here. To get the files for this release either order a CDROM or check out one of the FTP pages for a list of mirrors. Generic network stack improvements: …
Total cost of Epsilon breach could reach $4 billion
E-mail services firm Epsilon will face years of repercussions and up to $225 million in total costs as a result of its recent data breach, a massive event that indicates the …
Week in review: Nikon image authentication system cracked, fake AV for mobile platform and the PSN hack
Here’s an overview of some of last week’s most interesting news, articles and reviews: Wardriving gang targeting small firms A group of individuals who are …
Securing the cloud and securing data in the cloud are not the same
This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware