Help Net Security
WatchGuard gets virtual on security
WatchGuard released a virtualized version of their Quarantine Management Server. Used in conjunction with WatchGuard XCS content security appliances, the WatchGuard QMS …
Oracle buys Passlogix
Oracle acquired Passlogix, a provider of enterprise single sign-on (ESSO) solutions. Passlogix products help organizations improve and simplify security by enabling SSO for a …
Qualys acquires Nemean Networks
Qualys announced the acquisition of Nemean Networks,completed on August 31, 2010. This acquisition will expand Qualys’ research capabilities further into intrusion and …
Free iPhone rogue applications on Facebook
Sophos is warning Facebook users about messages currently circulating on the social network claiming that friends have received free iPhones. These messages, which have been …
Finding and managing SSL digital certificates
Digital certificates are now cornerstones to business technology. Located on servers, devices, networks and communication platforms, they represent a necessary security …
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security …
Snort 2.9.0 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New encryption offerings from Symantec
Symantec announced the expansion of its encryption solution set with the planned launch of PGP Whole Disk Encryption with support for Intel Anti-Theft Technology, Symantec …
Massive iTunes phishing attack
Apple’s popular iTunes platform has become a major target for hackers looking to steal credit card data from the service’s millions of users. Victims receive a …
The U.S. leads in malicious URLs
During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the “Top Producer of …
How to cut costs and still remain secure
You’ve just heard your budgets have been cut once again! This time it’s across all IT and security has got to be slashed too. As a CISO or IT manager, or indeed a …
Cyber security report reveals Feds’ take on FISMA 2.0
A new study examines Federal CIO and CISO perceptions and usage experiences for CyberScope, the new Federal Information Security Management Act’s (FISMA) online …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems