Read more about auditing
Bookmark and Share
  • Detect threat patterns across your web and mobile assets

    06.08.2014

    During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather threat intelligence on all websites and mobile apps that are legitimately or illegally associated with their business.

  • Code analysis and app security testing simplified

    28.04.2014

    Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker's attacks to pinpoint vulnerable code.

  • Netwrix releases six new auditing solutions

    13.03.2014

    Netwrix released six new Netwrix Auditor solutions, each offered with up to five times more features than before.

  • Most security managers under pressure to deliver apps faster

    25.02.2014

    At the RSA Conference, Tufin announced the results of a survey of 169 security professionals on the current state of security operations.

  • Trust but verify: Mozilla execs invite researchers to audit their code

    14.01.2014

    The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into their offerings and has prevented them from talking about it publicly, has left many users wondering how they can be sure that the software they plan to use will not be used against them.




Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //