Help Net Security
60% of WiFi networks lack protection according to a PandaLabs survey
Panda Software has published the “Security in Wireless Networks”, report by PandaLabs, highlighting the security deficiencies in WEP, the most widely used protocol …
Husband And Wife Face Slammer For Trojan Horse That Spied On Businesses, Sophos Reports
Experts at SophosLabs, Sophos’s global network of virus, spyware and spam analysis centres, have welcomed the news that a married couple are to be jailed for developing …
University Of Wales Protects And Accelerates New Campus Wireless Network With Blue Coat Appliance
CAMBERLEY, UK – March 14, 2006 – Blue Coat® Systems, the leader in secure content and application delivery, today announced that its ProxySGâ„? appliance with …
Philip Zimmermann releases Zfone, a product that secures VoIP
Zimmermann thinks Zfone is better than the other approaches to secure VoIP, because it achieves security without reliance on a PKI, key certification, trust models, …
Neoscale Unveils Cryptostor Keyvault For Centralized, Multivendor Storage Encryption Key Management
MILPITAS, Calif. — March 14, 2006 — NeoScale Systems Inc., the premier provider of enterprise storage security solutions, today announced CryptoStor KeyVaultâ„?, the …
Winmagic To Develop First Full-Disk Encryption Software To Fully Integrate With Infineon’s Trusted Module Platform (TPM) Security Chip
Mississauga, Ontario, March 13, 2006 – WinMagic Inc. (www.WinMagic.com), the innovative leader in full-disk encryption, today announced at CeBIT (Hall 7, Booth A20) that …
Six Credit Unions Choose Green Armor Solutions’ Identity Cues Two Factor for FFIEC and NCUA Compliant Two-Factor & Two-Way (Mutual) Authentication
HACKENSACK, N.J. — March 13, 2006 — Six credit unions from across the United States are implementing Green Armor Solutions’ Identity Cues Two Factor …
Legal Expert Speaks at I.T Security Seminar
LONDON, March 13, 2006 – An area often overlooked in the implementation of an organisation’s IT security infrastructure is that of the legal consequences of a …
SSH Announces Future Plans For Enhanced File Transfer
HELSINKI, FINLAND and WELLESLEY, Mass. – March 14, 2006 – SSH Communications Security Corp. (HEX:SSH1V), a world-leading provider of enterprise security solutions …
The 7 myths about protecting your web applications
Today Web Applications are delivering critical information to a growing number of employees and partners. Most organizations have already invested heavily in network security …
Symantec Selects Qualys On Demand Vulnerability Management to Deliver Enhanced Managed Security Services
Redwood Shores, CA – March 13, 2006 – Qualys Inc., the leading provider of on demand vulnerability management, today announced a strategic partnership with …
atsec information security Evaluates IBM z/OS V1R7
AUSTIN, Texas – March 13, 2006 – atsec information security corporation, an independent, standards-based IT (information technology) security consulting and …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)