Help Net Security
Sophos acquires Endforce
Sophos announced that it has acquired Endforce, a leader in network access control (NAC) and endpoint security policy compliance solutions for enterprise customers. Sophos …
Automated Scanning vs. The OWASP Top Ten
The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability …
Scam contract killer email blackmails recipients
IT security firm Sophos is warning internet users about a new spam campaign purporting to come from a professional hitman, in an attempt to steal money. The emails claim that …
Hands-on Trusted Computing workshop at RSA Conference 2007
The Trusted Computing Group (TCG), whose open specifications for computing security have been built into an estimated 50 million trusted systems, will host a half-day workshop …
TopDog 802.11n among first selected for Wi-Fi protected setup testbed
Marvell announced that Marvell’s TopDog 802.11n access point solutions and 802.11a/b/g wireless USB client solutions have been selected as part of the Wi-Fi Alliance …
GateKeeper appliance receives EAL2 Common Criteria Certification
Xceedium announced that its flagship GateKeeper appliance was awarded Common Criteria Evaluation Assurance Level 2 (EAL2) certification for meeting strict government IT …
AmbironTrustWave acquires SecurePipe
AmbironTrustWave has acquired SecurePipe, a Lincolnshire, Ill.-based managed security provider. The terms of the deal are confidential.Established in 1996, SecurePipe provides …
Astaro chosen as one of “Top 20 Companies to Watch in 2007”
Astaro Corporation announced that it has been named one of the “Top 20 Companies to Watch in 2007” by Linux Magazine. The list features vendors that are best …
Critical vulnerability affecting Microsoft Excel
Fortinet announced that its leading security research team was key in discovering the latest Microsoft critical vulnerability, which impacts users of Microsoft Excel. The …
WhiteHat Security announces new risk-free trade-up program
WhiteHat Security is inviting interested parties to trade in their legacy website scanning product(s) (up to three seats or web applications per customer) and receive a …
Unisys Canada starts deploying the Enterprise Password Safe
Unisys Canada has chosen to implement the Enterprise Password Safe from Enterprise Data Safe to provide a secure, audited repository for some of their passwords. The …
Acunetix puts a stop to identity theft in Universities
Institutions for higher education and Not-For-Profit Organizations are experiencing a surge in attempts aimed at hacking their data. The more recent known examples were …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)