Centralized management for self-encrypting drives
Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting …
36 credit card fraud websites taken down
36 website domains, used to sell compromised card data, have been taken down following a day of action on Wednesday to target online criminals by SOCA working with the FBI and …
Majority of web apps vulnerable to most frequent exploits
84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …
World renowned experts to examine SSL governance
Just two months from its inauguration date at the RSA Conference in San Francisco on February 29, the Trustworthy Internet Movement (TIM) announced today that it has chosen …
Hotmail remote password reset 0-day bug found, patched
A critical security flaw affecting Microsoft’s Hotmail has been detected almost simultaneously by Vulnerability Lab researchers and a Saudi Arabia hacker and, until a …
DLP with real-time artificial intelligence
BeyondTrust announced PowerBroker DLP v4.0, its data loss prevention solution with real-time, distributed artificial intelligence, which provides organizations a …
The Conficker threat and the reality of targeted attacks
The Conficker worm is still one of the biggest ongoing threats to enterprises, says Microsoft. According to the newly released Microsoft Security Intelligence Report volume …
Photos: Infosecurity Europe 2012, part 2
Help Net Security is attending Infosecurity Europe 2012 in London this week. Here’s a peek at the situation on the expo floor.
Most orgs don’t know what data is leaving their systems
Only 20% of IT executives say they have visibility into files and data moving inside and leaving their organization, and 29% of them perceive moving data back and forth …
Remote penetration testing service
Digital Assurance announced the launch of its new Digital Assurance Vulnerability Engine (DAVE). Designed to increase the flexibility and efficiency of security testing while …
Secure USB desktop environment for the enterprise
Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …
Facebook partners with security vendors, offers free AV
Facebook has announced that it’s partnering with five top security companies and it will be offering downloads of their anti-virus solutions on a newly created AV …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware