Read more about virtualization
Bookmark and Share
  • Automated password management for privileged accounts

    13.06.2013

    BeyondTrust announced the release of PowerBroker Password Safe, including integration with Retina CS, the company’s vulnerability management platform.

  • Backup and recovery problems exposed

    07.06.2013

    A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data protection for virtual environments.

  • Bringing networking and security together through network automation

    10.05.2013

    The past ten years have seen a proliferation of increasingly complex network devices.

  • Is network monitoring dead?

    03.05.2013

    Network monitoring is dead, says the CEO of cPacket Networks; that is, unless network monitoring solutions become agile enough to deliver real-time visibility, while keeping up with the increasing complexity, volume, and speed of network traffic in virtualized data center and cloud application delivery environments.

  • Hosted virtual desktops can increase security

    26.04.2013

    One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //