Please turn on your JavaScript for this page to function normally.

Infosecurity Europe 2012

Security implications of the rise of silicon-based life forms

Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …

Automated hacking

The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …

Make your pentester work harder for his money

In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java. Many modern exploits use Java as a stepping …

Global dashboard for monitoring the quality of SSL support

Last week we announced SSL Pulse, a continuously updated dashboard that is designed to show the state of the SSL ecosystem at a glance. While it is possible today to deploy …

Web and content filtering appliances by Bloxx

Bloxx announced the release of the Bloxx Secure Web Gateway (SWG), an appliance that combines the company’s dynamic real-time content analysis and classification engine, …

Anomaly detection solution for mobile banking

Guardian Analytics announced FraudMAP Mobile, the company’s latest fraud prevention innovation, purpose-built to identify suspicious mobile banking activity. The …

Centralized management for self-encrypting drives

Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting …

Majority of web apps vulnerable to most frequent exploits

84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …

World renowned experts to examine SSL governance

Just two months from its inauguration date at the RSA Conference in San Francisco on February 29, the Trustworthy Internet Movement (TIM) announced today that it has chosen …

DLP with real-time artificial intelligence

BeyondTrust announced PowerBroker DLP v4.0, its data loss prevention solution with real-time, distributed artificial intelligence, which provides organizations a …

Photos: Infosecurity Europe 2012, part 2

Help Net Security is attending Infosecurity Europe 2012 in London this week. Here’s a peek at the situation on the expo floor.

Most orgs don’t know what data is leaving their systems

Only 20% of IT executives say they have visibility into files and data moving inside and leaving their organization, and 29% of them perceive moving data back and forth …

Don't miss

Cybersecurity news