virtualization
Super-scalable LDAP directory driven by big data
Radiant Logic announced a commercial solution for distributed storage and processing for enterprise identity management. Based on Hadoop, this new highly-available version of …
Automated password management for privileged accounts
BeyondTrust announced the release of PowerBroker Password Safe, including integration with Retina CS, the company’s vulnerability management platform. PowerBroker …
Backup and recovery problems exposed
A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …
Bringing networking and security together through network automation
The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, …
Is network monitoring dead?
Network monitoring is dead, says the CEO of cPacket Networks; that is, unless network monitoring solutions become agile enough to deliver real-time visibility, while keeping …
Hosted virtual desktops can increase security
One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …
SafeNet releases first crypto hypervisor
At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …
AlienVault releases USM virtual appliance
AlienVault released its AlienVault Unified Security Management (USM) virtual appliance, a collection of open source tools for asset discovery, vulnerability assessment, threat …
Rackspace launches Mobile Cloud Stacks
Rackspace released its new mobile cloud stacks for developers. These stacks are purpose built to help developers design, build, test, deploy and scale mobile apps in the …
Malware analysis for Virtual Desktop Infrastructures
HBGary unveiled Active Defense 1.3 to provide live, runtime memory analysis of concurrent Guest OS sessions with minimal impact on the shared physical resources of the …
The cloud: Storms on the horizon
At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …
Complex malware and BYOD drive mobile security
Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems