Help Net Security
10 Gig threat management system protects critical IP services
Arbor Networks announced a 10 Gig DDoS detection and mitigation system that enables application-layer attack protection. The Threat Management System 3100 (TMS) delivers deep …
New ForeScout CounterACT features PCI compliance kit
The payment card industry established the PCI DSS for the protection of cardholder information in response to widely publicized security breaches. Enforced through compulsory …
Q&A: iPhone Security and the Enterprise Market
Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community …
Third Brigade acquires open source host intrusion detection project
Third Brigade has acquired OSSEC, an open source, host-based intrusion detection system. The OSSEC project produces a multi-platform, scalable, host-based intrusion detection …
Network security change workflow solution
AlgoSec launched FireFlow, an-end-to-end policy change workflow solution which automates what is often a disjointed and manual process to ensure that changes to network …
Mismatch between IT security challenges and deployed solutions
The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …
Sophos assists computer crime unit in a botnet master case
Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley. The hacker, of Panama City, Florida, who went by the alias …
Virtual worlds face malware reality check
Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …
Explaining non-delivery report type of spam
Research shows that up to 90% of emails received by companies are spam, and spammers have adopted a variety of methods to bypass spam filters used in anti-spam software. In …
PCI Compliance Explained
Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …
When it comes to data security breaches, the general public doesn’t need to know
When it comes to data security breaches, 78 percent of US IT decision-makers feel that companies do not need to inform the general public; this according to a recent survey by …
Best of Open Source Security Conference announced
Sourcefire announced the launch of the Best of Open Source Security (BOSS) Conference. Scheduled to run concurrently with Sourcefire’s annual customer summit, the BOSS …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC