Private and hybrid clouds quickly gaining ground |
- Private and hybrid clouds quickly gaining ground
- Malware and vulnerability testing for business websites
- Top 7 threats to cloud computing
- Free service for malware detection on websites
- Inspect your encrypted communications
- Message and web cloud-based security services
- A 184% increase of malicious websites
- Severe IE vulnerability threatens Windows XP users
- Automated defense against industrialized cyber attacks
- Waledac disruption only the beginning, says Microsoft
- 58 percent of software vulnerable to security breaches
- Fake Virustotal serves malware
- Q&A: Malware analysis
- Rugged and secure portable drive
- Introducing SOURCE Conference Boston
- Protect every asset in the cloud infrastructure
- Week in review: Twitter phishing, rogue software and Waledac botnet takedown
Private and hybrid clouds quickly gaining ground Posted: 01 Mar 2010 02:32 PM PST IEEE and the Cloud Security Alliance announced results of a survey of IT professionals that reveals overwhelming agreement on the importance and urgency of cloud computing security standards. Amo... |
Malware and vulnerability testing for business websites Posted: 01 Mar 2010 12:29 PM PST Qualys introduced Qualys GO SECURE a new service that allows businesses of all sizes to test their web sites for the presence of malware, network and web application vulnerabilities, as well as SS... |
Top 7 threats to cloud computing Posted: 01 Mar 2010 11:59 AM PST The Cloud Security Alliance and HP have presented today new research findings that detail the potential threats linked to the use of cloud services. The report, titled "Top Threats to Cloud Comp... |
Free service for malware detection on websites Posted: 01 Mar 2010 11:41 AM PST Qualys introduced QualysGuard Malware Detection, a free service that proactively scans web sites of any size, anywhere in the world, for malware infections and threats, and provides businesses with ... |
Inspect your encrypted communications Posted: 01 Mar 2010 10:55 AM PST Netronome announced the Netronome SSL Inspector Appliance for 10 Gbps networks. It can be deployed in without negatively impacting network throughput or latency, and guarantees accurate detection an... |
Message and web cloud-based security services Posted: 01 Mar 2010 08:15 AM PST M86 Security announced its Secure Messaging Service, a cloud-based Software as a Service solution that incorporates key features from MailMarshal SMTP and includes capabilities such as Text Censor... |
A 184% increase of malicious websites Posted: 01 Mar 2010 07:54 AM PST The volume of spam saw an increase of 5,5 percent, and malicious websites of a whooping 184 percent since January, says the latest MessageLabs Intelligence report. An increase of activity of the Gr... |
Severe IE vulnerability threatens Windows XP users Posted: 01 Mar 2010 05:24 AM PST News of a newly discovered bug in VBScript and Windows Help files in Internet Explorer that could allow a remote attacker to run an arbitrary command has reached Microsoft on Friday and they immediate... |
Automated defense against industrialized cyber attacks Posted: 01 Mar 2010 03:56 AM PST Imperva announced ThreatRadar, an add-on to Imperva's Web Application Firewall (WAF) that provides automated, reputation-based defense against large scale industrialized cyber attacks. ThreatRada... |
Waledac disruption only the beginning, says Microsoft Posted: 01 Mar 2010 03:29 AM PST In the wake of the news regarding Microsoft's disruption of Waledac botnet's links between its command and control centers and the infected zombie computers by legal means, Richar Boscovich, the senio... |
58 percent of software vulnerable to security breaches Posted: 01 Mar 2010 02:45 AM PST Veracode released a "State of Software Security" report detailing vulnerabilities found in software that large organizations rely on for business critical processes, which finds that more than hal... |
Fake Virustotal serves malware Posted: 01 Mar 2010 01:51 AM PST The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a malicious site that abuses t... |
Posted: 01 Mar 2010 12:42 AM PST Greg Hoglund is the CEO and Founder of HBGary. He has been a pioneer in the area of software security. After writing one of the first network vulnerability scanners, he created and documented the firs... |
Rugged and secure portable drive Posted: 28 Feb 2010 09:18 PM PST Enova's X-Wall FX provides the hardware real-time cryptographic capability to your entire SATA portable drive including SSD within a tightly integrated USB 2.0 and SATA interface controller, making ... |
Introducing SOURCE Conference Boston Posted: 28 Feb 2010 09:10 PM PST SOURCE Boston is a security conference that brings security professionals and business leaders together, sails into the Boston's Seaport Hotel April 21-23, 2010. The event is designed to discuss ... |
Protect every asset in the cloud infrastructure Posted: 28 Feb 2010 09:05 PM PST Lieberman Software announced an enhancement to Enterprise Random Password Manager (ERPM) that now delivers fine-grain management features to protect every asset in the cloud infrastructure includi... |
Week in review: Twitter phishing, rogue software and Waledac botnet takedown Posted: 28 Feb 2010 09:00 PM PST Here's an overview of some of last week's most interesting news and articles: 75% of organizations suffered a cyber attack 42 percent of organizations rate security their top issue, which isn't ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment