Help Net Security
Entrust expands authentication platform
Entrust is extending their Non-Federal Identity SSP service to include Personal Identity Verification-Interoperable (PIV-I) compliance for state governments, the private …
Week in review: European Space Agency breach, SQL injection trends and iPhone secret location tracking
Here’s an overview of some of last week’s most interesting news and reviews: Final report: Pan-European cyber security exercise The EU’s cyber security …
GFI VIPRE Antivirus integrated into OPSWAT MetaDefender
OPSWAT has added GFI VIPRE Antivirus technology to its MetaDefender solutions portfolio. OPSWAT enhanced its malware detection capabilities by incorporating the award-winning …
IT teams still struggling with spam and viruses
IT teams are still struggling to protect their businesses from spam email and viruses, according to Mimecast. Their research also finds that the majority of organizations are …
Video: Inside the new Facebook data center
Facebook recently opened its new data center in Oregon and journalists were able to visit the Prineville facility. The videos below, recorded by Data Center Knowledge, take …
Prevent an interruption to cloud services
AEP Networks responded to the concerns over the loss of connectivity to cloud-based applications by launching a communications platform that automatically diverts cloud …
Android and iOS downloadable Microsoft PlayReady-based DRM solution
AuthenTec announced the first Microsoft PlayReady-based downloadable DRM client solution for Android and iOS devices. The offering is now part of its Downloadable DRM Fusion …
Encrypted text messaging for BlackBerry and Android
ProtectedSMS enables BlackBerry and Android users to exchange secure, encrypted text messages with individuals who have installed the software. Unlike other secure texting …
Most employees would steal confidential company information
The majority of IT staff and C-level executives would definitely take confidential company information when they left their organization, according to Cyber-Ark. Despite 66% …
Dramatic increase in cyberattacks on critical infrastructure
A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their …
Regulatory compliance is a top concern in 2011
Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 …
Dimension Data partners with Qualys
Qualys announced that Dimension Data will offer the QualysGuard IT Security and Compliance Suite as part of its portfolio of solutions to organizations around the globe. As a …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous