Comprehensive vulnerability, configuration, OS and app auditing |
- Comprehensive vulnerability, configuration, OS and app auditing
- Real-time threat intelligence delivery
- Canadian government networks breached by Chinese hackers?
- Mobile security solution enforces policy in the cloud
- Securing data centers from blended threats
- Moderately critical MS Windows vulnerability revealed
- A Trojan-Clicker for Android spotted
- Cloud encryption software for private cloud infrastructures
- One in 10 IT pros have access to accounts from previous jobs
- Closing the privileged identity visibility gap
- Cloud-based software reputation platform
Comprehensive vulnerability, configuration, OS and app auditing Posted: 17 Feb 2011 01:44 PM PST nCircle announced that its solutions now audit for over 40,000 conditions including vulnerabilities, configurations, operating systems and applications. The company also continues to expand its poli... |
Real-time threat intelligence delivery Posted: 17 Feb 2011 12:24 PM PST As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter E-Security's Threat In... |
Canadian government networks breached by Chinese hackers? Posted: 17 Feb 2011 11:21 AM PST When it comes to covert cyber attacks on government networks, it somehow seems that they can always be traced back to servers in China. It is always acknowledged that that doesn't mean that the Ch... |
Mobile security solution enforces policy in the cloud Posted: 17 Feb 2011 10:03 AM PST Zscaler unveiled Zscaler Mobile, which adds a uniform way to secure the mobile experience for small to large organizations. The solution enforces policy in the cloud, not on the device. This mea... |
Securing data centers from blended threats Posted: 17 Feb 2011 08:42 AM PST Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said family. The FortiGate-3140... |
Moderately critical MS Windows vulnerability revealed Posted: 17 Feb 2011 07:06 AM PST Information about a critical Microsoft Windows SMB browser election request parsing vulnerability turned up two days ago on the Full Disclosure mailing list and further investigation into the matter l... |
A Trojan-Clicker for Android spotted Posted: 17 Feb 2011 05:40 AM PST A new Android Trojan - dubbed HongTouTou or ADRD - has been spotted targeting Chinese-speaking users. Repackaged with popular Android applications and games, it is being distributed via unregulate... |
Cloud encryption software for private cloud infrastructures Posted: 17 Feb 2011 04:48 AM PST CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company enables organizations t... |
One in 10 IT pros have access to accounts from previous jobs Posted: 17 Feb 2011 03:56 AM PST According to a survey that examines how IT professionals and employees view the use of policies and technologies to manage and protect users' electronic identities, the sharing of work log-ins and p... |
Closing the privileged identity visibility gap Posted: 17 Feb 2011 03:16 AM PST Security information and event management (SIEM) solutions have become a must-have in IT environments because the technology helps make sense of the vast quantities of data provided by security soft... |
Cloud-based software reputation platform Posted: 17 Feb 2011 12:55 AM PST Bit9 announces the first open, cloud-based reputation platform available to assess the trustworthiness of software. The Bit9 Global Software Registry (GSR) is now accessible via an open application ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment