Please turn on your JavaScript for this page to function normally.
Updated research of the largest base of real-world vulnerability data

Wolfgang Kandek, CTO of Qualys, today unveiled Laws of Vulnerabilities 2.0 derived from the industry’s largest vulnerability dataset. The Laws 2.0 reveals vulnerability …

Microsoft outlines progress towards a safer Internet

Microsoft discussed progress toward enabling End to End Trust, the company’s vision for a safer, more trusted Internet first introduced at last year’s event. In …

RSA provides transparent authentication to enterprises

The new release of the RSA Adaptive Authentication platform is designed for large, distributed enterprise environments and helps to identify users using self-learning risk …

Ubuntu 9.04 has been released

Ubuntu 9.04 Desktop Edition delivers a range of feature enhancements to improve the user experience. Shorter boot speeds, some as short as 25 seconds, ensure faster access to …

Corporations adjust to deal with IT security with reduced budgets

The worst downturn in a generation is forcing organizations to adapt to reduced budgets at the same time as facing increased threats and greater scrutiny through new …

Photos: RSA Conference 2009 expo #3

Here’s another glance at the RSA Conference 2009 expo floor. The featured companies are: SSH, Venafi, SenSage, MBX, Marshal8e6, Sophos, CA and Oracle. The first and …

First two-factor universal personal authenticator for mobile phones

FireID launched in the US its universal personal authenticator that turns any mobile phone into a convenient and powerful self-contained, one-time-password (OTP) generator to …

Set of single sign-on, authentication and provisioning solutions

Passlogix released version 7.0 of the Passlogix v-GO Access Accelerator Suite, an integrated set of single sign-on, authentication and provisioning solutions that includes a …

EMC builds SharePoint security and availability

As organizations see SharePoint deployments rapidly expand, the platform becomes a more strategic and valuable asset that requires closer governance and an ability to identify …

Whitelisting for Microsoft Hyper-V

Solidcore has extended the whitelisting capabilities of its S3 Control software to secure Microsoft Hyper-V virtual environments. Solidcore S3 Control uses combined …

Podcast: Cloud Security Alliance

The Cloud Security Alliance (CSA) is a non profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and …

Agentless configuration auditing for virtualized infrastructure

nCircle announced that its Configuration Compliance Manager (CCM) configuration auditing solution now audits the full VMware virtual infrastructure, from virtual machines to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools