Help Net Security
AuthenTec combines fingerprint security with Symantec VIP
AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …
Next Level Security Systems releases mobile apps
Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …
Cisco and Lumos Networks prepare fiber infrastructure for 100G network
Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …
Open source audit plug-in for MySQL
McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …
New cloud disaster recovery service
EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …
Exploiting legitimate online technology
Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …
Data center industry dynamics
While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …
Microsoft disrupts massive cybercrime operation
In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …
Free online tool teaches IT security procedures
AVG Technologies launched SMB BootCamp, a free, online tool to help SMBs demonstrate to customers that their company is seriously committed to following AVG’s …
Week in review: Facebook privacy loophole, Duqu still active, the world of vulnerability sellers
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: US govt and military email addresses offered for sale Webroot has …
Securing SharePoint
Microsoft SharePoint enables information sharing and report publishing. It also provides a search facility for users to find content. The problem is that, all too easily, any …
Plan to reduce botnets launched
More than one in ten U.S. computers are infected by difficult-to-detect bots, which botmasters can use for anything from sending spam, to eavesdropping on network traffic, to …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC