Help Net Security
New defense for DNS cache poisoning threat
NitroSecurity has developed a unique IPS solution that virtually eliminates the threat of DNS cache poisoning. Through research with the Rochester Institute of Technology …
IBM pushes for preemptive approach to Web application security
With more services moving online, the cost of recovering from a security breach can reach into the hundreds of millions of dollars. In addition, ensuring compliance with …
The power of distributed Wi-Fi encryption
Xirrus asserts the importance of line-rate Wi-Fi encryption at the network edge to support non-compromised Wi-Fi performance. The rollout of 802.11n – which brings a 6X …
Enterprise-grade password management solution
Cloakware announced the immediate availability of Cloakware Password Authority 4.0, the only enterprise-grade solution to automate the lifecycle management of privileged …
McAfee to acquire Secure Computing
McAfee, Inc. announced the execution of a definitive merger agreement to acquire Secure Computing Corporation for $5.75 per common share in cash, without interest, …
Malicious obfuscated code evolution
Finjan announced that its Malicious Code Research Center (MCRC) discovered examples of obfuscated code embedded in rich-content files, and not only in HTML-webpages on …
Patent on PKI certificate technology
SSH Communications Security, a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell …
Network troubleshooting and remediation with PacketTrap Perspective
PacketTrap Networks announced the availability of PacketTrap Perspective, a new network troubleshooting and remediation solution developed for the single and multiple-site …
Music piracy group member goes to prison
Barry E. Gitarts, 25, of Brooklyn, New York, was sentenced today to 18 months in federal prison after his conviction on May 22, 2008, for conspiracy to commit criminal …
New Intel vPro technology enhances security
Intel Corporation today introduced its third-generation Intel vPro suite of business desktop PC technologies, which among other features enhances security and reduces the time …
Handhelds with integrated biometrics
Law enforcement, military, and Homeland Security personnel looking for fully-integrated mobile identity verification options now have two new tools to better track and locate …
Software escrow strategy for automating intellectual property protection
iForem unveiled its strategy for developing and delivering on-demand, purely-digital Automated Intellectual Property Protection products. iForem’s current and planned …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)