Help Net Security
Open source penetration testing framework Metasploit acquired by Rapid7
Metasploit, one of the top open source penetration testing frameworks, has just been acquired by Rapid7, a provider of vulnerability management, compliance and penetration …
BioP@ss paves the way for EU electronic ID cards
Chip manufacturers Infineon and NXP Semiconductors, and chip card maker Giesecke & Devrient are among the eleven companies from six EU countries participating in BioP@ss, …
IBM’s open-source alternative to Windows 7
IBM and Canonical are introducing a cloud- and Linux-based desktop package in the U.S. designed for use on a company’s existing fleet of PCs and low-cost netbooks. The …
Cybercriminals employ persuasive online scare tactics to sell rogue security software
Symantec announced the findings of its Report on Rogue Security Software. The findings, based on data obtained during the 12-month period of July 2008 to June 2009, reveal …
Security consulting services offered by RSA
RSA announced new consultative and advisory services to help enterprises implement or improve their security operations function to more effectively manage both risk and IT …
End-point security that can’t be disabled by the end-user
DeepNines Technologies announced iTrust Agent, an end-point security solution that allows organizations to enforce Acceptable Use Policies, security policies and content …
Oracle releases critical patch update – October 2009
Oracle has released its critical patch update which contains contains 38 new security fixes across all products. Some of the vulnerabilities addressed affect multiple …
The dangers of exposing information on social networking sites
In this podcast, Dr. Herbert Thompson, the Chief Security Strategist at People Security, discusses the variety of information that we, and those connected to us, disclose via …
Social media insight for the U.S. intelligence community
Visible Technologies announced a strategic partnership and technology development agreement with In-Q-Tel, the independent strategic investment firm that identifies innovative …
Top IT management trends – the next 5 years
Computerworld reports that according to Gartner’s research, client virtualization, more data, less energy consumption, resource tracking, social networks in the …
Survey: Encryption and key management
Thales announced that the PCI DSS and the HIPAA are driving encryption projects across industries, according to the findings of the new 2009 Encryption and Key Management …
CA launches Internet Security Suite Plus 2010
CA has unveiled its Internet Security Suite Plus 2010, which provides comprehensive security and protection when accessing the Internet for banking, shopping and spending time …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)