Help Net Security
Firewall Builder 4.0 released
Firewall Builder helps you write and manage configuration for your firewalls. It writes iptables commands, pf.conf file, Cisco router access lists or PIX configuration for …
Security risks of web application programming languages
A new WhiteHat report examined the security of specific programming languages. Until now, no other website security study has provided detailed research on how programming …
Freeware detects performance loss across the network
Disk Performance Analyzer for Networks 3.0 (DPAN) is a free utility that detects and reports severe fragmentation-related performance loss across the network, all from one …
Facebook Social Plug-ins privacy concerns sorted out by Palo Alto Networks
Facebook users in enterprises are susceptible to having their confidential data shared with third parties because of recent changes at Facebook, which cause behavioral data …
Fake Adobe Security Update malware campaign
Red Condor issued a warning of a new malware threat crafted to appear as an email thread discussing vulnerabilities in Adobe software. The campaign targets Adobe customers and …
Compliance Enforcer 3.0 released
Compliance Enforcer 3.0 leverages nexTier’s DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize …
Qualys and RSA expand IT-GRC collaboration
Qualys and RSA expanded their technology collaboration to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base. The …
Analyze the network behavior of unknown malware samples
The aim of the INetSim project is to perform a quick run-time analysis of the network behavior of unknown malware samples in a laboratory environment. Modules for the …
Rogue software details: AKM Antivirus 2010 Pro
AKM Antivirus 2010 Pro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Continued growth of rogue antivirus activity
Sunbelt Software announced the top 10 most prevalent malware threats for the month of April 2010. The list of detections for April is little changed from March with the …
PortalProtect 2.0: Web threat protection, content-filtering and data loss prevention
Trend Micro PortalProtect 2.0 supports the Microsoft SharePoint 2010 platform and is backed by the Trend Micro Smart Protection Network infrastructure which scans, filters and …
Open source software for cloud services deployment
Cloud.com announced CloudStack, an open source software solution that accelerates the deployment, management and configuration of multi-tier and multi-tenant private and …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy