Please turn on your JavaScript for this page to function normally.
Stonesoft a2Cloud: Strong authentication for secure cloud access

Stonesoft announced its new a2Cloud solution which offers secure access to the cloud with usability, minimal administration and low total cost of ownership. a2Cloud delivers …

First enterprise mobile DLP solution

Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …

Strong security is just common sense

For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …

NFC-enabled BlackBerry smartphones will “open doors”

HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …

Enterprise-level management and control of SSL certificates

Managing Secure Sockets Layer (SSL) certificates is critically important for enterprises and is becoming a larger challenge, especially due to the skyrocketing number of …

NBC News Twitter account hijacked by using a Trojan?

On the very eve of the tenth anniversary of the September 11 attacks, the NBC News Twitter account begun posting messages saying that two civilian airplanes have been hijacked …

SecurityByte: Cyber conflicts, cloud computing and printer hacking

Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …

KillSwitch technology catches brute-force attacks

Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …

Entrust strengthens mobile security with device authentication

In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …

New OAuth toolkit

Layer 7 Technologies unveiled its OAuth Toolkit, an enterprise-class solution to provide a generalized framework for handling a broad range of OAuth scenarios across cloud, …

Mac OS X Lion login password easily revealed

Mac OS X stores user login passwords in system memory even if the computer is locked or put into a sleep mode. The vulnerability is present in all modern versions of Mac OS X, …

Enterprises fail to control mobile access

The results of a Courion survey of 988 IT decision makers at large organizations indicate that whilst organizations are confident that they can assure appropriate user access …

Don't miss

Cybersecurity news