Read more about software
Bookmark and Share
  • Product spotlight: Qualys Continuous Monitoring

    14.05.2015

    Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organization’s perimeter.

  • Why WinSCP became an open source classic

    12.05.2015

    If you're a Windows user and you're connecting securely to remote machines, you've probably heard about WinSCP.

  • Product spotlight: Targeted threat intelligence from Solutionary

    08.05.2015

    As IT security threats have become more targeted to specific industries, organizations and even individuals, the need has arisen for threat intelligence that is tailored for individual organizations.

  • BalaBit updates Shell Control Box

    08.05.2015

    BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions.

  • Classification and protection of unstructured data

    07.05.2015

    In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data identification and information protection suite.




Spotlight

Reactions to the Hacking Team breach

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Jul 7th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //