Please turn on your JavaScript for this page to function normally.
Product pitch: Entrust IdentityGuard

In this podcast, Mike Moir, Product manager with Entrust, talks about Entrust IdentityGuard, an award-winning software authentication platform that helps financial …

LOK-IT Secure Flash Drive

After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …

Video: InfoSec World Conference & Expo 2012

Taking place in Orlando, Florida, the primary objective of InfoSec World is providing education to all levels of information security and IT auditing professionals. Help Net …

How to do BYOD the right way

The massive proliferation of mobile devices and the employees’ tendency to prefer using devices they chose themselves has created quite a conundrum and challenges for …

Multifunction printer hacking

A great number of multifunction printers of have the ability to integrate within a corporation’s business environment and connect to its email systems, its file systems, …

Encryption and key management as strategic business issues

Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organization’s encryption strategy, according to Richard Moulds, …

Shaping the future of information security

Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present …

New data encryption platform

CertiVox unveiled its PrivateSky Secure Information Exchange (SIX) platform. The service provides protection for email, files and other information sent via the cloud, through …

The challenges of setting up a security conference

In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …

The future of cybersecurity in cars

As technology evolves at a seemingly breakneck speed, we must be aware of the fact that the environments in which we find ourselves every day – environments that have in …

Cybercrime and Espionage

The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …

SecurityByte: Cyber conflicts, cloud computing and printer hacking

Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …

Don't miss

Cybersecurity news