Please turn on your JavaScript for this page to function normally.
Trustwave revokes “MitM” certificate, vows never to issue one again

Certificate authority Trustwave has revoked a subordinate root certificate it issued to a company that allowed it to intercept their employees’ private email …

Security architecture for trusted execution environments

Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …

The fusion of hardware encryption, PIN access and USB 3.0

Apricorn expanded their Aegis Secure Drives to the desktop environment with a new desktop edition, the Aegis Padlock. Sporting a spacious capacity of up to 3 TB with a Super …

Apache Shiro: Java security framework

Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …

New data encryption platform

CertiVox unveiled its PrivateSky Secure Information Exchange (SIX) platform. The service provides protection for email, files and other information sent via the cloud, through …

Multi-cloud security groups

Dome9 Security added a new capability called Dome9 Security Groups – group-based firewall policy management – to its leading cloud security management service. …

Entrust Discovery now offers Microsoft CAPI query capabilities

Entrust expands its certificate discovery solution, Entrust Discovery, by broadening search capabilities for digital certificates residing within Microsoft’s …

Samsung introduces suite of security features for Android

The Samsung Galaxy Note and Galaxy Tab 7.7 will be the first Samsung Approved for Enterprise (SAFE) devices provided to consumers who wish to use their own mobile devices in …

IPAM and DNSSEC key management integration

The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common …

Beware of password-protected documents carrying malware

Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …

GlobalSign reports CA infrastructure wasn’t compromised

When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …

Security-hardened key management

Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations …

Don't miss

Cybersecurity news