Infosecurity Europe 2012

Remote penetration testing service

Digital Assurance announced the launch of its new Digital Assurance Vulnerability Engine (DAVE). Designed to increase the flexibility and efficiency of security testing while …

Secure USB desktop environment for the enterprise

Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …

How to spot automated Web application attacks

Imperva released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why attacks on Web applications are automated. As much as 98 percent of …

Photos: Infosecurity Europe 2012

Help Net Security is attending Infosecurity Europe 2012 in London this week. Here’s a peek at the situation on the expo floor.

Situational and risk aware SIEM from McAfee

Next Generation SIEM Integrated with McAfee ePolicy Orchestrator, McAfee Risk Advisor and McAfee Global Threat Intelligence to Provide Customers with Unprecedented Visibility …

Top enterprise security concerns and IT problems

A global study of more than 1,200 IT professionals in EMEA reveals that, in the last year, more than one in five enterprises has experienced a security breach and one in 10 …

Security monitoring for BYOD environments

Lancope showcased its solution for securing bring-your-own-device (BYOD) environments based on the company’s flow-based monitoring technology. Unlike other BYOD security …

Network anomaly detection appliance by IBM

According to the 2011 IBM X-Force Trend and Risk Report, adversaries ramped up social engineering attacks, and X-Force witnessed mobile exploits having increased by 19 percent …

First portable malware intelligence system

ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully …

Web application attack report from FireHost

Secure cloud hosting company, FireHost, has revealed details about type and origin of web attacks that it has blocked from causing harm to clients’ web applications and …