Please turn on your JavaScript for this page to function normally.
Secure authentication of online customers

Concerns about identity theft are escalating. According to the Federal Trade Commission, as many as nine million Americans fall victim to this crime annually, resulting in …

GRC solution automates audit, control and risk functions

MEGA International introduced GRC Suite 3.0. This version is unique in its recognition of the overlap in audit, risk, and control activities; it offers a common platform …

Image-sensing technology for tracking individuals

Fujitsu announced the development of a new image-sensing technology that can thoroughly and accurately track – without blind spots – the motion paths of multiple …

New book: “Programming Amazon Web Services”

The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …

K-12 schools’ cyber safety declines

CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …

Information Assurance: National Security’s New Front Line

Nowadays, few would ever consider using the Internet “unprotected” without a reliable anti-virus software and firewall solution installed on their PC networks. Yet …

Home security, monitoring and automation platform

uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …

Changes to the Nessus Vulnerability Scanner subscription model

Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …

Japanese P2P virus writer convicted, but escapes jail

24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …

Big Book of Windows Hacks

When it comes to "how to" articles there's a wealth of free material available online. With the growing popularity of blogs, a myriad of people are eager to share their hacks …

New book: “The Book of IMAP”

The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …

IT spending concerns mounting

An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools