encryption
Security architecture for trusted execution environments
Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …
The fusion of hardware encryption, PIN access and USB 3.0
Apricorn expanded their Aegis Secure Drives to the desktop environment with a new desktop edition, the Aegis Padlock. Sporting a spacious capacity of up to 3 TB with a Super …
Apache Shiro: Java security framework
Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …
New data encryption platform
CertiVox unveiled its PrivateSky Secure Information Exchange (SIX) platform. The service provides protection for email, files and other information sent via the cloud, through …
Multi-cloud security groups
Dome9 Security added a new capability called Dome9 Security Groups – group-based firewall policy management – to its leading cloud security management service. …
Entrust Discovery now offers Microsoft CAPI query capabilities
Entrust expands its certificate discovery solution, Entrust Discovery, by broadening search capabilities for digital certificates residing within Microsoft’s …
Samsung introduces suite of security features for Android
The Samsung Galaxy Note and Galaxy Tab 7.7 will be the first Samsung Approved for Enterprise (SAFE) devices provided to consumers who wish to use their own mobile devices in …
IPAM and DNSSEC key management integration
The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common …
Beware of password-protected documents carrying malware
Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …
GlobalSign reports CA infrastructure wasn’t compromised
When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …
Security-hardened key management
Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations …
Top 5 authentication predictions for 2012
Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …
Featured news
Resources
Don't miss
- Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
- Notepad++ supply chain attack: Researchers reveal details, IoCs, targets
- Why boards must prioritize non-human identity governance
- Open-source attacks move through normal development workflows
- Product showcase: 2FAS Auth – Free, open-source 2FA for iOS