Help Net Security
Best cloud identity provider in the world: you
MultiFactor SecureAuth announced an integrated 2-factor authentication solution that enables an enterprise to become an instant identity provider (IdP) for cloud based …
Introduction to Hacktics’ Seeker web application vulnerability scanner
At the RSA Conference 2010 Innovation Sandbox, we met up with Ron Porat, CEO of Hacktics and recorded a short podcast in which he introduces their flagship product Seeker. …
Proactive forensic toolkit for threat-based policies
Norman ASA announced its Forensic Toolkit, which enables organizations to investigate client activity and provides a management console that makes it easy to apply policies to …
Massive Mariposa botnet shut down
Mariposa botnet has been shut down and three suspected criminals accused of operating it have been arrested by Spanish law enforcement. Mariposa stole account information for …
Tokenization that eliminates data collision
Protegrity announced a tokenization enhancement to the Protegrity Data Protection System (DPS) 5.2, the newest version of its data protection platform. Tokenization is the …
Secure borderless networks architecture
Cisco announced the Cisco Secure Borderless Network architecture, which evolves enterprise security by focusing on four critical anchors: enterprise endpoints (mobile or …
Photos: RSA Conference 2010 Expo, part 2
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: McAfee, NetOptics, EMC, Symantec and Qualys.
Millions lost due to illegal interception of cell phone calls
A survey released today by the Ponemon Institute on behalf of Cellcrypt, reveals that large and medium businesses are putting themselves at risk as a result of cell phone …
Wireless IDS for merchants and healthcare
Cybera announced SECURE|WAVE, its wireless intrusion detection service that identifies threats and vulnerabilities by analyzing wireless network traffic, and is designed for …
Introduction to Altor’s virtual firewall
Altor Networks has just been announced as the winner of RSA’s Innovation Sandbox “Most Innovative Company at RSA Conference 2010” contest. Listen to the …
6 in 10 malicious URLs bypass AV scanners and URL filtering
M86 Security released a new report revealing its Security Labs research results based on the primary attack vectors on the Web and how the common approaches used to fend off …
Video: Innovation Sandbox at the RSA Conference 2010
Take a peek at the atmosphere at the Innovation Sandbox, a half-day event during which you could witness interactive white boarding sessions, ask the experts and whisper …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime