Help Net Security
Photos: RSA Conference Europe 2009 expo floor
Here is our first set of photos from the expo floor of this year’s RSA Conference Europe. If you missed previous photos from keynote sessions, click here.
The security implications of cloud computing
Nowadays, cloud computing is one of the most talked about topics that’s been the spark of many heated debates especially when it comes to security issues. In this …
Open source penetration testing framework Metasploit acquired by Rapid7
Metasploit, one of the top open source penetration testing frameworks, has just been acquired by Rapid7, a provider of vulnerability management, compliance and penetration …
BioP@ss paves the way for EU electronic ID cards
Chip manufacturers Infineon and NXP Semiconductors, and chip card maker Giesecke & Devrient are among the eleven companies from six EU countries participating in BioP@ss, …
IBM’s open-source alternative to Windows 7
IBM and Canonical are introducing a cloud- and Linux-based desktop package in the U.S. designed for use on a company’s existing fleet of PCs and low-cost netbooks. The …
Cybercriminals employ persuasive online scare tactics to sell rogue security software
Symantec announced the findings of its Report on Rogue Security Software. The findings, based on data obtained during the 12-month period of July 2008 to June 2009, reveal …
Security consulting services offered by RSA
RSA announced new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT …
End-point security that can’t be disabled by the end-user
DeepNines Technologies announced iTrust Agent, an end-point security solution that allows organizations to enforce Acceptable Use Policies, security policies and content …
Oracle releases critical patch update – October 2009
Oracle has released its critical patch update which contains contains 38 new security fixes across all products. Some of the vulnerabilities addressed affect multiple …
The dangers of exposing information on social networking sites
In this podcast, Dr. Herbert Thompson, the Chief Security Strategist at People Security, discusses the variety of information that we, and those connected to us, disclose via …
Social media insight for the U.S. intelligence community
Visible Technologies announced a strategic partnership and technology development agreement with In-Q-Tel, the independent strategic investment firm that identifies innovative …
Top IT management trends – the next 5 years
Computerworld reports that according to Gartner’s research, client virtualization, more data, less energy consumption, resource tracking, social networks in the …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations