Help Net Security
Guard Against Cyberspace Threats
With the changing nature of threats in cyberspace, the need is growing to absorb attacks and to protect online identities against both high-profile and stealthy infiltration …
QualysGuard receives new vulnerability checks
Each month, Microsoft releases new security patches that may impact devices on your network. Many organizations struggle to understand and prioritize these patches and …
IBM z/OS V1R9 evaluated – Common Criteria certification at EAL4+
atsec information security recently completed the Common Criteria evaluation of IBM z/OS V1R9. The certificate was awarded by Germany’s Federal Office for Information …
Spy dust catches thieves: FBI says “no comment”
Nox Defense has released an invisible perimeter defense technology, which combines high-resolution video pictures and RFID tags, sometimes referred to as “spy …
Research project enhances existing OpenSolaris security functionality
Sun Microsystems and the United States’ National Security Agency (NSA) announced an agreement to jointly work within the OpenSolaris community to research and to develop …
IBM cracks Web 2.0 security concerns with “SMash”
IBM announced new technology to secure “mashups,” web applications that pull information from multiple sources, such as Web sites, enterprise databases or emails, …
Mobile and remote working: is it secure?
The move towards remote and mobile working seems to be an unstoppable trend. Research by ZDNet and Rhetorik found that the penetration of mobile workers across the UK …
Comodo releases full version of Trustix Enterprise Firewall for free
Comodo announced the commercial release of Trustix Enterprise Firewall (TEF) version 4.8, a free enterprise class LINUX-based firewall solution. Trustix Enterprise …
First end-point security solution for Android OS
Savant Protection’s end-point security solution has been successfully ported to Android providing optimum security against cyber-security threats for the much …
Top 10 countries relaying spam per capita
Sophos revealed the top ten countries relaying the most spam per capita. The top three spam-relaying countries – the United States, Russia and China – which …
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Web-based applications and services have changed the landscape of information delivery and exchange in today’s corporate, government, and educational arenas. Ease of …
Microsoft releases four critical security bulletins
Another Patch Tuesday and Microsoft comes out with critical vulnerabilities are in Microsoft Office. Users are recommended to update as soon as possible. Vulnerabilities in …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits