Read more about endpoint security
Bookmark and Share
  • Attackers use Google Drive, Dropbox to breach companies

    05.08.2015

    A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack tools, Imperva has revealed in a report released today at Black Hat USA 2015.

  • Qualys announces free global asset inventory service

    05.08.2015

    At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on any IT asset where an agent is deployed, scaling to millions of assets for organizations of all sizes.

  • Security challenges emerging with the rise of the personal cloud

    05.08.2015

    Personal cloud is growing in importance as it shapes how employees operate across their digital lives, according to Gartner.

  • Fox-IT launches cyberthreat management platform

    20.04.2015

    Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide unified, overarching control of an organization’s entire cyberthreat management operations.

  • The portable secure desktop: tVolution Mini

    20.04.2015

    At the RSA Conference 2015 Becrypt launched tVolution Mini.




Spotlight

Hope is not a strategy, we need more healthy paranoia

35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership "relying on hope as a strategy" to avoid a cyber security breach.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Aug 31st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //