Help Net Security
Video: Snort – the forensics tool?
In the video below you can watch Dave Warren give a talk on “Snort – The Forensics Tool?”. The video was taken at this month’s DojoSec Monthly Briefings.
Endpoint security offering from IBM
IBM announced a first-of-a-kind endpoint security offering, IBM Proventia Endpoint Secure Control (ESC) which delivers endpoint security management designed to address two …
New System-on-a-Chip 1U communication appliance platform
Portwell Technology announces CATO-2000, a new System-on-a-Chip 1U communication appliance platform based on the Intel EP80579 Integrated Processor with Intel QuickAssist …
Juniper expands SRX series with SRX3000 services gateways
Juniper Networks announced the expansion of the Juniper Networks SRX Series with the SRX3000 line of extensible networking and security products that run on JUNOS Software, a …
New modification of the Kido Trojan
Kaspersky Lab has detected a new modification of Kido. This latest variant differs from previous ones in that it extends the Trojan functionality used in earlier versions of …
Credit crunch fuels surge in Web attacks
ScanSafe issued its Annual Global Threat Report based on an analysis of more than 240 billion Web requests processed in 2008 by the ScanSafe Threat Center from corporate …
Security updates available for Adobe Reader 9 and Acrobat 9
A critical vulnerability has been identified in Adobe Reader 9 and Acrobat 9 and earlier versions. This vulnerability would cause the application to crash and could …
Heavy duty security for lightweight PCs
Kaspersky Lab introduced Kaspersky Security for Ultra Portables. The product includes all of the features and functionality of our most advanced consumer security suite, …
Information management with self aware configuration management database
netForensics announced enhancements to its nFX Security Information Management solution, nFX SIM One 4.1 which provides customers with integration to HP’s Configuration …
Comodo locks down sensitive information
Comodo offers protection for those who want to protect their information from falling into the wrong hands. Using security algorithms, Comodo Disk Encryption encrypts any …
The effectiveness of IT investments
Whilst economic pressures have put the spotlight on short-term IT cost savings, according to a new report by Butler Group, of even greater significance is the longer-term …
New version of Atlas Internet monitoring system
Arbor Networks unveiled the new ATLAS Internet monitoring system which has been enhanced to look beyond security-related events. It now includes real-time global Internet …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?