XML propels security intelligence

Tuesday, 29 August 2006, 12:06 PM EST

Typical enterprises include task-specific security devices in heterogeneous environments that cannot easily communicate or coordinate mitigation strategies. Several proprietary approaches exist to facilitate this communication, but these are usually limited to single-vendor environments.

At Network World.

[ Read more ]




Spotlight

The psychology of phishing

Posted on 23 July 2014.  |  Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //