Please turn on your JavaScript for this page to function normally.
Preparations for secure collaboration in a de-perimeterized business world

Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …

Full disk encryption for the Mac platform

Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …

The Botnet Business

Botnets have been in existence for about 10 years; experts have been warning the public about the threat posed by botnets for more or less the same period. Nevertheless, the …

When it comes to data breaches business owners have false sense of security

A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an …

SonicWALL updates its SSL VPN appliances

SonicWALL released flexible new enhancements to its SSL VPN product line, making it even easier for small to mid-size businesses to use and manage their secure remote access …

Centralized management with intuitive graphical monitoring

Stonesoft introduced StoneGate Management Center 4.3 for advanced centralized management which offers a fully customizable, graphical monitoring portal, an executive summary …

Internet-enabled live streaming solution for crisis management

ICOP announced the commercial launch of ICOP LIVE, a wireless, audio and video streaming solution designed to provide real-time situational awareness to first responders, …

SSH Tectia Server 6.0 for IBM z/OS has been released

SSH announced the general availability of SSH Tectia Server 6.0 for IBM z/OS. SSH Tectia Server for IBM z/OS is an advanced, cost-effective, secure file transfer solution for …

Safeguarding Your Data With TrueCrypt

There are countless reasons why you’d like to make sure your data stays private. Maybe you travel a lot and you’re worried your laptop may be stolen, perhaps you …

Block privileged users from accessing sensitive data

Role-based access and other built-in DBMS controls are designed to prevent end-users from accessing sensitive data in databases, but they cannot prevent DBAs and other …

Nasty new worms and adware pests

This week’s PandaLabs report focuses on the Xp-Shield adware and the Ridnu.H and DisaCKT.B worms. Xp-Shield is an adware (or advert-displaying program) which tries to …

Spammers capitalise on Manchester United win to trick unwary fans

Sophos is warning Manchester United fans keen to bask in their team’s glory to be wary of unsolicited emails following the discovery of a spam campaign that contains the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools