Help Net Security
Fujitsu develops HDD security technology based on Opal SSC standards
Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …
2008 spam lessons learned: “Stop the guns, not just the bullets”
Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …
NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management
NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …
Mac theft recovery application Undercover now with location tracking
Orbicule announced the integration of Wi-Fi Positioning software from Skyhook Wireless into Undercover, a theft-recovery application that can track any stolen Mac. Undercover …
Positive financial results from Check Point Software
Positive financial results are not so common these days, so let us briefly cover that Check Point Software reported record fourth quarter and fiscal year 2008 numbers. Here …
VoIP service providers not focusing on impending threats
As the VoIP market evolves, security threats loom on the horizon. However, service providers are not seemingly taking the necessary actions to prepare for the impending …
Backup and disaster recovery for virtual environments with Arkeia Network Backup 8
Arkeia Software released Arkeia Network Backup 8 which delivers the first true virtual appliance for backup that gives customers free choice of hardware. The Arkeia Virtual …
Most SharePoint users are inadequately protected
A survey conducted by Osterman Research and commissioned by Trend Micro of 269 IT managers involved in overseeing the messaging and collaboration infrastructure of their …
Commex HTX-based content-aware 10GbE network adaptor – Vulcan SE HT6210
Commex Technologies announced its Vulcan SE HT6210 content-aware dual-channel 10GbE Network Interface Card (NIC) for the HP ProLiant DL785 G5 server which connects the network …
78% of computer users never encrypt emails
A privacy and encryption survey conducted by Steganos has found that consumers are not using encryption to protect their online identity. Steganos surveyed 120 consumers in …
January 2009 malware and spam geographical and vertical trends
January 2009 MessageLabs Intelligence Report highlights the following trends: Geographical Trends: Although, spam levels in France fell by 0.3 percent in January, France …
PayPal UK customers can now use strong authentication passwords
Internet users in the UK now have the option of using VeriSign Identity Protection on their PayPal account as an extra layer of security to protect their online identity. …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware