Help Net Security
Preparations for secure collaboration in a de-perimeterized business world
Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …
Full disk encryption for the Mac platform
Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …
The Botnet Business
Botnets have been in existence for about 10 years; experts have been warning the public about the threat posed by botnets for more or less the same period. Nevertheless, the …
When it comes to data breaches business owners have false sense of security
A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an …
SonicWALL updates its SSL VPN appliances
SonicWALL released flexible new enhancements to its SSL VPN product line, making it even easier for small to mid-size businesses to use and manage their secure remote access …
Centralized management with intuitive graphical monitoring
Stonesoft introduced StoneGate Management Center 4.3 for advanced centralized management which offers a fully customizable, graphical monitoring portal, an executive summary …
Internet-enabled live streaming solution for crisis management
ICOP announced the commercial launch of ICOP LIVE, a wireless, audio and video streaming solution designed to provide real-time situational awareness to first responders, …
SSH Tectia Server 6.0 for IBM z/OS has been released
SSH announced the general availability of SSH Tectia Server 6.0 for IBM z/OS. SSH Tectia Server for IBM z/OS is an advanced, cost-effective, secure file transfer solution for …
Safeguarding Your Data With TrueCrypt
There are countless reasons why you’d like to make sure your data stays private. Maybe you travel a lot and you’re worried your laptop may be stolen, perhaps you …
Block privileged users from accessing sensitive data
Role-based access and other built-in DBMS controls are designed to prevent end-users from accessing sensitive data in databases, but they cannot prevent DBAs and other …
Nasty new worms and adware pests
This week’s PandaLabs report focuses on the Xp-Shield adware and the Ridnu.H and DisaCKT.B worms. Xp-Shield is an adware (or advert-displaying program) which tries to …
Spammers capitalise on Manchester United win to trick unwary fans
Sophos is warning Manchester United fans keen to bask in their team’s glory to be wary of unsolicited emails following the discovery of a spam campaign that contains the …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised