Help Net Security
New book: Network Flow Analysis
Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively …
WhiteHat Sentinel: SaaS website vulnerability management
WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, …
Firefox 3.6.4 fixes several security issues
Mozilla released Firefox 3.6.4 that fixes several security issues as well as stability issues. User tracking across sites using Math.random() Security researcher Amit Klein …
Secure social media management
Cyveillance announced the availability of Secure Social Media Management, which provides organizations with professional review and consultation of social media policies and …
Basic TCP/IP analysis
Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the video below he discusses …
Teens share alarming amounts of personal info online
McAfee released “The Secret Life of Teens,” a survey that surveyed 955 U.S. 13-17 year olds (including 593 teens ages 13-15 and 362 teens aged 16-17) and reveals …
The ultimate Black Hat 2010 party by Qualys
The Qualys party at Black Hat featuring integration partners will take place at the Jet Mirage Nightclub on Wednesday, July 28, 8PM – 2AM. Dance the night away to …
Online family protection for iPhone, iPod touch and iPad
McAfee announced Family Protection iPhone, iPod touch and iPad Edition which provides strong parental controls to keep children safe when they are browsing the Internet on an …
Patch management from the cloud
In today’s IT world, devices are mobile and the Internet has become the corporate network. The result is additional challenges for IT Managers to keep devices patched …
Trustwave acquires Breach Security
Trustwave, a provider of information security and compliance solutions, has acquired Breach Security, a provider of web application firewall technology. The terms of the deal …
Rugged Tablet PC with hard drive encryption
Motion Computing announced the J3500 Tablet PC which features Intel Core vPro processors for enhanced performance, security and manageability. The J3500 also offers a variety …
Half of IT professionals leave mobile security to chance
As threats to corporate data grow, and the cost of breaches increase, a survey of alleged security conscious professionals has remarkably revealed that over half of …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems