Help Net Security
IBM Internet Security Systems discovers Veritas NetBackup vulnerability
IBM announced that its Internet Security Systems X-Force research and development team has discovered and preÂÂemptively protected customers from a vulnerability in …
CAN-SPAM Act continues to come up short in efforts to curb unsolicited email
Despite the upcoming three-year anniversary of the federal CAN-SPAM act, Barracuda Networks reports that spam is showing no signs of slowing down. The CAN-SPAM act of 2003 …
AlgoSec Firewall Analyzer helps with HIPAA compliance
AlgoSec announced that three additional major US Healthcare organization have recently installed the industry leading AlgoSec Firewall Analyzer (AFA) to meet Health Insurance …
Imperva Extends Operations into Europe
Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for Europe, the Middle East, and Africa (EMEA). Mepsted will …
CyberGuard 1.0 information protection tools at your fingertips
CyberGuard arms you with a powerful arsenal of tools that let you encrypt files using asymmetric encryption, erase your internet and computer usage tracks, shred files with …
Access Smart’s Power LogOn passes rigorous hacker proof test program
Access Smart announced today that Elite Development Group (EDG), a leading Orange County security solutions provider, has given Access Smart’s Power LogOn password …
Botox And IT Security – Is It Too Late For You?
As a fifty something male, personal grooming takes on whole new meaning. You realize that when you start typing “Botox” on Google that things are getting serious. …
Positive Networks launches PositivePRO Version 3.5
Positive Networks introduced PositivePRO 3.5, the newest version of the company’s award-winning secure remote access service. Its users receive regular updates as …
Official (ISC)2 guide to the CISSP CBK now available
The International Information Systems Security Certification Consortium, Inc. [(ISC)2] announced the publication of the Official (ISC)2 Guide to the CISSP CBK a comprehensive …
Full suite of solutions to meet web application security needs for any size company
Cenzic introduced two new products to protect small enterprises from vicious hackers. Hailstorm Starter and Hailstorm Core are based on Cenzic’s award-winning Hailstorm …
New Bagle worm causes incidents among users
PandaLabs has detected the appearance of Bagle.KT, a new variant of this infamous family of worms. According to data from PandaLabs, this malicious code has already caused a …
PCI Data Security Standard Calls for Next-Generation Network Security
The widespread use of credit cards for virtually all of our financial transactions has increased exponentially with the rapid adoption of e-commerce throughout the worldwide …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!