Tokenization that eliminates data collision
Protegrity announced a tokenization enhancement to the Protegrity Data Protection System (DPS) 5.2, the newest version of its data protection platform. Tokenization is the …
Secure borderless networks architecture
Cisco announced the Cisco Secure Borderless Network architecture, which evolves enterprise security by focusing on four critical anchors: enterprise endpoints (mobile or …
Photos: RSA Conference 2010 Expo, part 2
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: McAfee, NetOptics, EMC, Symantec and Qualys.
Millions lost due to illegal interception of cell phone calls
A survey released today by the Ponemon Institute on behalf of Cellcrypt, reveals that large and medium businesses are putting themselves at risk as a result of cell phone …
Wireless IDS for merchants and healthcare
Cybera announced SECURE|WAVE, its wireless intrusion detection service that identifies threats and vulnerabilities by analyzing wireless network traffic, and is designed for …
6 in 10 malicious URLs bypass AV scanners and URL filtering
M86 Security released a new report revealing its Security Labs research results based on the primary attack vectors on the Web and how the common approaches used to fend off …
Phishing made easier
Given the proliferation of phishing sites, you may be excused for thinking that phishing schemes are easy to set up. Unfortunately for the common Internet user, phishing has …
Photos: RSA Conference 2010 Expo, part 1
Here’s a glance at the RSA Conference 2010 expo floor. The featured companies are: Qualys, VeriSign, Black Box, HP and the NSA.
Secure corporate desktop on USB stick
Check Point announced Check Point Abra, a solution which turns any PC into a fully secure corporate desktop. The Abra stick provides users access to company emails, files and …
Manage your physical and virtual machines
Shavlik announced the beta release of IT.Shavlik.com, a cloud-based IT management service that helps businesses manage their physical and virtual machines from any location, …
38% of IT managers ignore Web 2.0 risks
FaceTime’s fifth annual survey showed social media and Web 2.0 applications have been adopted by 99% of end users to support business processes, even though 38% of IT …
Can Aurora attacks be prevented?
A lot has been written already about the “Aurora” attacks on major US companies. Speculation about and investigations into the origin of the attack and the code …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity