Help Net Security
InfoSec World 2008: Photos of the venue
Here’s a collection of photos of the Orlando venue where the InfoSec World Conference & Expo 2008 is taking place.
Open source code for driving security into web services
OpenLiberty, the global open source community working to provide developers with resources and support for building interoperable, secure and privacy-respecting identity …
Breach Security upgrades web application security solution
WebDefend, now in version 3.2, identifies and stops abuse of web application resources, offers higher performance, and delivers enhancements to ease enterprise-wide adoption. …
SSH Communications Security releases SSH Tectia 6.0
SSH Communications Security Corp. released SSH Tectia Client 6.0, SSH Tectia Server 6.0, SSH Tectia Manager 6.0, and the new, innovative SSH Tectia ConnectSecure 6.0. …
Change and Configuration Solutions Aid PCI Auditors
To the casual observer of the Payment Card Industry (PCI) standard, it might seem that the standard deals exclusively with the servers and point-of-sale terminals that house …
NSA certifies the Sectera Edge smartphone
The National Security Agency (NSA) has certified the wireless Sectera Edge smartphone, a product of General Dynamics C4 Systems, for voice communications classified up to the …
Brothers sentenced for selling $6+ million in pirated software
Two brothers were sentenced today in federal court to 30 months and three years in prison for selling massive amounts of pirated computer software. After receiving complaints …
Top 10 malware of the week
According to data gathered at the Infected or Not website the NaviPromo adware has been the most active malicious code this week. Adware occupies nine spots in the top ten …
WatchGuard unifies security and mobility
WatchGuard unveiled new remote access solutions designed to give remote and mobile workers highly secure connectivity to their corporate network. For enterprise organizations …
Enhanced protection for Exchange and SQL servers in a virtual environment
Companies are increasingly using virtualization for a variety of different productivity and cost saving reasons. Virtualization is being increasingly used by IT departments …
Details on the new anti card fraud mobile phone technology
A new Israeli technology brought to the U.S. by Secure Identity Systems (SIS) thwarts credit and debit card fraud, and potentially stops ID thieves in the act. This in turn …
Annual state of IBM System i (AS/400) security study
The PowerTech Group, Inc. today released its fifth annual review of the state of security on IBM’s System i platform (also known as AS/400 or iSeries). This year’s …
Featured news
Resources
Don't miss
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
- Global Threat Map: Open-source real-time situational awareness platform
- How Secure by Design helps developers build secure software