Help Net Security
Agentless configuration auditing
nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …
Poor password practices and how to change them
When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …
Full-service virtual SIEM solution
LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …
Oracle’s critical patch update advisory for October 2010
Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …
49 vulnerabilities fixed in record Patch Tuesday
In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …
Data retention system for cyber investigative operations
Bivio Networks announced the launch of its Data Retention System, a data collection and retention system to strengthen cyber security operations for network operators and …
Questions to ask of a cloud provider
At the RSA Conference Europe 2010, the Cloud Security Alliance (CSA) released version 1.0 of the Consensus Assessments Initiative Questionnaire. The questionnaire is available …
RSA offers complete threat management solution
RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …
HID Global acquires ActivIdentity
HID Global announced that parent company ASSA ABLOY has entered into a definitive agreement to acquire ActivIdentity. ActivIdentity provides identity assurance solutions, …
Bugat Trojan linked to LinkedIn phishing campaign
Researchers have discovered a new version of the Bugat financial malware used to commit online fraud. Bugat was distributed in the recent phishing campaign targeting LinkedIn …
Four virtual appliances for cloud security
Fortinet announced four new virtual appliances that extend the company’s ability to deliver security across virtualized and cloud environments. The FortiGate, …
Social media sites and universities increasingly targeted by phishers
Social media sites and educational institutions were increasingly targeted by phishers who continued to expand the targets of their attacks in the first half of 2010. With …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance