Help Net Security
IRISS Conference 2010 call for papers
IRISS will hold its first annual conference on the 18th of November 2010. This all day conference will focus on providing you with an overview of the current cyber threats …
Early life cycle security assessment service
HP announced Comprehensive Applications Threat Analysis, a new security service to help companies reduce vulnerabilities at the onset of the application development life cycle …
Beware when placing online bets during the World Cup
With the World Cup approaching, online players all over the world are preparing to place their bets on the different soccer games. Taking security issues into account and …
iPhone security showcase: SafeWallet – Password Manager
Mobile software producer SBSH this week released a new version of SafeWallet – Password Manager, an application used for storing private information on your iPhone and …
Rogue software details: Protection Center
Protection Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Cyberattacks still top security priority
USIS released a study that identified key issues facing government and industry security personnel and identified a key issue in terms of security vendor structure and …
34 vulnerabilities fixed in June Patch Tuesday
In today’s Patch Tuesday, Microsoft delivers 10 security bulletins that address 34 vulnerabilities affecting Windows, Office and Internet Explorer. Vulnerabilities in …
IBM launches new security solutions
Today at the IBM Innovate 2010 conference in Orlando, IBM introduced new software and services that help organizations build security into the initial design of their …
Source code testing tool AppScan Source Edition released
Building on the momentum of its recent acquisition of security vendor Ounce Labs, IBM introduced AppScan Source Edition, a new addition to its Web application security and …
Uncovering the business benefits behind the new ICO powers
The latest amendment to the Data Protection Act, which came into effect on the 6th of April, means that the Information Commissioner’s Office (ICO) is now able to impose …
IBM delivers secure enterprise mail for the iPad
IBM announced an expansion of IBM Lotus messaging and collaboration software with the delivery of secure enterprise mail for the Apple iPad. IBM Lotus Notes Traveler is no …
1 in 10 IT pros cheat on an IT audit
According to a survey conducted by Tufin Technologies, of 242 IT professionals mainly from organizations employing 1000 to 5000+ employees, 1 in 10 admitted that either they …
Featured news
Resources
Don't miss
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days