Read more about virtualization
Bookmark and Share
  • Super-scalable LDAP directory driven by big data

    09.07.2013

    Radiant Logic announced a commercial solution for distributed storage and processing for enterprise identity management.

  • Automated password management for privileged accounts

    13.06.2013

    BeyondTrust announced the release of PowerBroker Password Safe, including integration with Retina CS, the company’s vulnerability management platform.

  • Backup and recovery problems exposed

    07.06.2013

    A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data protection for virtual environments.

  • Bringing networking and security together through network automation

    10.05.2013

    The past ten years have seen a proliferation of increasingly complex network devices.

  • Is network monitoring dead?

    03.05.2013

    Network monitoring is dead, says the CEO of cPacket Networks; that is, unless network monitoring solutions become agile enough to deliver real-time visibility, while keeping up with the increasing complexity, volume, and speed of network traffic in virtualized data center and cloud application delivery environments.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //