Help Net Security
New book: “Vulnerability Management For Dummies”
Qualys has teamed up with John Wiley & Sons to publish the first “Vulnerability Management For Dummies”. This is the first accessible, easy-to-read guide to …
Roaming workers up to no good on the web
In data released today, ScanSafe has confirmed the long held belief that employees are engaging in risky web surfing when working outside the office. The company found that …
Global Security Challenge offers $500K in grants
Global Security Challenge (GSC), the largest international security innovation competition, is open for entries, offering security start-ups worldwide the opportunity to …
RFID solution for IT asset tracking
Companies are challenged with accounting for millions of dollars of owned and leased IT assets within their expansive data centers. Of even greater concern is the potential …
HNS Podcast: Penetration testing considerations
In this HNS podcast, Anothony Alves from CORE Security Technologies talks about penetration testing. He dicusses the things you should look for when considering doing a …
Windows Live Hotmail CAPTCHA cracked by spambots
Websense Security Labs ThreatSeeker technology has discovered that spammers in their recent tactics have drawn their attention towards traditional and infamous Hotmail, aka …
Unique exploitation scenario using a recently disclosed Flash vulnerability
Memory corruption vulnerabilities are becoming increasingly difficult to exploit, largely due to the protection mechanisms being integrated into most modern operating systems. …
PCI Security Standards Council issues Payment Application Data Security Standard
The PCI Security Standards Council, a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (DSS), PCI PIN Entry Device …
Data at rest security for Oracle customers goes global
Relational Database Consultants announced today that the Encryption Wizard, a leading security and encryption software offering for the Oracle RDBMS, now ships with Natural …
New version of Zertificon secure virtual mailroom
Z1 SecureMail family of products safeguards a company’s e-mail transmissions across the board with its encryption and signature – and, in the process, remains …
Post-April tips to prevent identity theft
Tens of millions of tax returns have just been filed electronically for the tax year 2007. Anyone who has filed their taxes this way and has their personally identifiable …
Check Point delivers new Power-1 appliances
Check Point today announced the launch of Check Point Power-1, a new line of Internet security appliances offering high-performance sites a simple, robust, and easy to manage …
Featured news
Resources
Don't miss
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised
- How CISOs can talk cybersecurity so it makes sense to executives