Help Net Security
APSolute Immunity provides networks with ability to fight emerging threats
Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …
More malicious attacks on the Threat Horizon
The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …
Malware growth at a higher level than ever before
In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …
New book: “Your Brain: The Missing Manual”
Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …
Multiple vulnerabilities in Ruby
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …
Research pinpoints how institutions should respond to data breaches
Javelin Strategy & Research announced today results from a new study covering data breach victims, which highlights the acute awareness among consumers about data …
Lack of visibility and control puts enterprise network resources at risk
Nearly 50% of enterprises believe employees and non-employees have access to data that is not relevant to their job function according to a recent survey the company …
New mobile antivirus and firewall solutions
Sybase iAnywhere today announced that it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities. Sybase Information Anywhere …
C2 Systems: No Longer a Proprietary Issue
The past five years have seen remarkable transformation in how military Command and Control (C2) systems are designed and procured. Proprietary and costly custom developed …
The demand for RFID and biometric security solutions
Government and security agencies worldwide increasingly demand high-tech solutions to secure their borders. In response, the security industry is developing technology that …
Shocking data privacy abuse by UK businesses
UK businesses are giving out highly personal and confidential details about their customers to third parties in a bid to boost sales reveals a new survey by StrongMail of 900 …
Threat of an embedded security disaster
For many years, embedded systems have been quietly working behind the scenes of almost all modern technologies, from automobiles to factory floors to space exploration …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits