Please turn on your JavaScript for this page to function normally.
Rule Set Based Access Control 1.2.5 Available

Rule Set Based Access Control v1.2.5 has just been released. RSBAC is a flexible, powerful and fast open source access control framework for current Linux kernels. From a …

Wireless Security for Hotspot Users: iPig to the Rescue

Germany based, Windows security and web applications experts at iOpus, just released iPig, a freeware wireless security application. Currently in beta version and therefore …

SAP TV: Videos on Sarbanes-Oxley and Biometrics

Thomas Neudenberger, COO of realtime North America Inc., facilitated an interview with Professor Paul Foote, (a Harvard educated Accounting Professor in California and …

Using a Blog Service to Minimize Your Exposure to Spammers

Blogs are extremely popular nowdays. I spend most of my non-business related surfing time on blogs. As the number of blogs is increasing every day, I often come across …

Windows Security update for DirectX 8

Microsoft has reported two buffer overflow problems in DirectX, known set of APIs used by Windows programs and games for multimedia support and announced that the update that …

P.I. Protector Mobility Suite available on U3 Smart Drive Computing Platform

imagine LAN Inc. announced the release of P.I. Protector Mobility Suite for U3 powered USB smart drives. P.I. Protector includes imagine LAN’s patent-pending portable …

ID Theft Protection Solution: Virtual Authentication Devices

Bharosa Virtual Authentication Devices provide the enterprise with optimal defenses against identity theft crimes including phishing, trojans and malware. Their technology …

Spyware is Being Designed For a Broader Audience Than Ever Before

Monitoring spyware used to be advertised primarily for keeping children safe, or for law enforcement agencies. Why does a spouse need remote installation capabilities with …

Finger On The Pulse Of Identity

The contours of the finger, the patterns of the iris and the shape of the hand can all be used to provide strong authentication, but are these – and other – …

Passwords In Security

Breaking into corporate networks, and thereby corporate information, has never been easier. Why? Firstly, access to systems (usually Windows) at the desktop is universal. …

The Gloves Are Off Taking The Fight To The Spammers

2005 has already seen spammers and virus writers become more shrewd, more malicious, more sophisticated and more hungry for commercial gain. The potential damage that this …

Popular Policies: Keeping Storage Secure

Secure storage of data has always been essential for any organisation, of whatever size. In the past this involved accurate filing of paper records, and then keeping the …

Don't miss

Cybersecurity news