Read more about RSA Conference 2012
Bookmark and Share
  • Encryption and key management as strategic business issues

    02.03.2012

    Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organizationís encryption strategy, according to Richard Moulds, the vice president for product management and strategy at Thales e-Security.

  • Identity, app and mobile device monitoring

    02.03.2012

    Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively deliver end-to-end visibility for vastly improved network and security operations.

  • Trusted Computing Group unveils new membership option

    02.03.2012

    Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, and to integrators and resellers.

  • Real-time session monitoring by Cyber-Ark

    02.03.2012

    Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity.

  • Protection for data in the cloud

    02.03.2012

    Fasoo announced three security solutions that enable protection for data in the cloud.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //