Help Net Security
IronKey Enterprise Server delivers management of secure USB drives
IronKey launched IronKey Enterprise Server 2.0, a scalable on-premise solution for managing IronKey Enterprise flash drives. It features active malware defenses and identity …
Miss Singapore commits credit card fraud
The Telegraph reports that the incumbent Miss Singapore World. Ris Low, is a fraud – but not in a way you would expect. It turns out that she took advantage of her …
Proofpoint enhances its email security and DLP platform
Proofpoint introduced version 6 of Proofpoint, its SaaS and appliance email security and data loss prevention platform. The platform delivers integrated data loss prevention …
Online backup or cloud recovery?
Backing up files and data online has been around for quite a while, but it has never really taken off in a big way for business customers. There is also a new solution coming …
Study shows IT sector catalyst for global economic recovery
IDC and Microsoft released the results of a global research, finding that the IT industry will create 5.8 million new jobs and more than 75,000 new businesses over the next …
RSA Conference Europe keynote line-up
The complete line-up of keynote speakers for the 10th annual RSA Conference Europe has been announced. The conference, taking place from 20th-22nd October 2009 at the Hilton …
Video: Damn Vulnerable Web App installation
This video shows the installation process of Damn Vulnerable Web App (DVWA).
VMware Fusion DoS and privilege escalation vulnerabilities
Two vulnerabilities have been reported in VMware Fusion, which can be exploited by malicious, local users to cause a Denial of Service or gain escalated privileges. Kernel …
NitroSecurity adds configuration and change management to its SIEM platform
NitroSecurity announced the integration of configuration and change management features into its NitroView information security management platform. The ability to manage …
Companies make little headway in securing data
The Independent Oracle Users Group (IOUG) released its database security study, “IOUG Data Security 2009: Budget Pressures Lead to Increased Risks”. The study …
Experts teach cyber safety to school kids
(ISC)2 launched its Safe and Secure Online volunteer program in the U.S., offering cyber security professionals from business and government to teach cyber safety in …
Red Hat addresses Supreme Court on software patents
Red Hat has filed an amicus brief with the United States Supreme Court. In the brief, Red Hat explains the practical problems of software patents to software developers. The …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)