Help Net Security
The security implications of cloud computing
Nowadays, cloud computing is one of the most talked about topics that’s been the spark of many heated debates especially when it comes to security issues. In this …
Open source penetration testing framework Metasploit acquired by Rapid7
Metasploit, one of the top open source penetration testing frameworks, has just been acquired by Rapid7, a provider of vulnerability management, compliance and penetration …
BioP@ss paves the way for EU electronic ID cards
Chip manufacturers Infineon and NXP Semiconductors, and chip card maker Giesecke & Devrient are among the eleven companies from six EU countries participating in BioP@ss, …
IBM’s open-source alternative to Windows 7
IBM and Canonical are introducing a cloud- and Linux-based desktop package in the U.S. designed for use on a company’s existing fleet of PCs and low-cost netbooks. The …
Cybercriminals employ persuasive online scare tactics to sell rogue security software
Symantec announced the findings of its Report on Rogue Security Software. The findings, based on data obtained during the 12-month period of July 2008 to June 2009, reveal …
Security consulting services offered by RSA
RSA announced new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT …
End-point security that can’t be disabled by the end-user
DeepNines Technologies announced iTrust Agent, an end-point security solution that allows organizations to enforce Acceptable Use Policies, security policies and content …
Oracle releases critical patch update – October 2009
Oracle has released its critical patch update which contains contains 38 new security fixes across all products. Some of the vulnerabilities addressed affect multiple …
The dangers of exposing information on social networking sites
In this podcast, Dr. Herbert Thompson, the Chief Security Strategist at People Security, discusses the variety of information that we, and those connected to us, disclose via …
Social media insight for the U.S. intelligence community
Visible Technologies announced a strategic partnership and technology development agreement with In-Q-Tel, the independent strategic investment firm that identifies innovative …
Top IT management trends – the next 5 years
Computerworld reports that according to Gartner’s research, client virtualization, more data, less energy consumption, resource tracking, social networks in the …
Survey: Encryption and key management
Thales announced that the PCI DSS and the HIPAA are driving encryption projects across industries, according to the findings of the new 2009 Encryption and Key Management …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)