Photos: HITBSecConf 2012 Amsterdam
Taking place this week in Amsterdam is the well-known HITBSecConf that features deeply technical talks, workshops, hands-on lab sessions, a brand new attack and defense …
Mobile security threats cause confusion
UK and US businesses are in a state of uncertainty around if, and how, to protect their networks against the threats brought about by mobile devices entering the workplace. …
Birdstep unveils SafeMove SSL VPN
Birdstep launched its SafeMove Clientless SSL VPN, offering easy, secure and efficient remote access to the enterprise network. While Birdstep’s full SafeMove Mobile VPN …
Security analysis tool Trisul 2.4 released
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
SANS announces digital forensics training event in Europe
SANS is launching its first dedicated digital forensics training event in Prague in October offering a full immersion experience over a 7 day event combining leading …
Significant malware increase across all platforms
In Q1, PC malware reached its highest levels in four years, as well as a steep increase in malware targeting the Android platform. Mac malware was also on the rise, indicating …
Wombat enhances PhishPatrol, the anti-phishing email filter
Wombat Security Technologies released a new version of PhishPatrol, an e-mail filter designed to strengthen a business’s current filtering system by catching phishing …
Cellebrite updates forensic extraction device
Cellebrite announced the release of several advancements for the company’s industry leading Universal Forensic Extraction Device (UFED) Series. Cellebrite’s …
Testing program of VPN security for mobile devices
To help millions of enterprise users of smartphones and tablets send and receive data securely, ICSA Labs is offering a testing program for determining whether these devices …
New network storage array from Iomega
Iomega announced the Iomega StorCenter px12-450r Network Storage Array, multi-protocol networked data storage for small and medium business, remote office/branch office …
Financial fraud drives most targeted attacks
Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …
Tips for a unified records management approach
While an increasing number of companies have one policy for handling paper documents and electronic files, the pervasive growth of new record sources like Twitter, wikis and …
Featured news
Resources
Don't miss
- The top CTEM platforms you should know in 2025
- Croatian research institute confirms ransomware attack via ToolShell vulnerabilities
- Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business