Please turn on your JavaScript for this page to function normally.
Forensic toolkit delivers speed, analytics and scalability

AccessData announced the release of version 3 of Forensic Toolkit, a solution that delivers enhanced analytics, remote device acquisition and expanded reporting options. GUI …

Video: How to steal a botnet

Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A …

Desktop virtualization and security survey

Imprivata conducted a national survey targeting executives across a wide array of industries (including healthcare, financial services, state and local governments agencies) …

Oracle releases version 9 of Application Testing Suite

Oracle announced version 9 of the Oracle Application Testing Suite, an integrated solution for load testing, functional testing and test management, enabling customers to …

VLC 1.0.2 fixes security issue

After almost 2 months and 27 million downloads of VLC 1.0.1, VideoLAN released VLC 1.0.2 introduces many fixes, notably for SSA decoding, v4l2, MacOS interface, ogg/theora, …

Cisco IOS Software NTP packet vulnerability

The Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. NTP runs over UDP, which in turn runs over IP. When a Cisco IOS Software …

Book giveaway: Get some free knowledge!

NOTE: The contest is now over, the winners have been notified. This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving …

Complimentary tool for measuring organizations’ breach index

Today breach notification regulations take effect under the HITECH Act. HIPAA-covered entities, including healthcare providers and business associates, are now required to …

Trends transforming IT in 2010

The Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends will also bring business and technology stakeholders …

Companies struggle to protect consumer data

Imperva and the Ponemon Institute announced the findings of a survey across more than 500 U.S. and multinational IT security practitioners showing that, despite the Payment …

INTERPOL’s new secure e-passport initiative

INTERPOL‘s Secretary General Ronald K. Noble announced that the EDAPS Consortium had been chosen to design and produce the world’s largest police …

IEEE ratifies 802.11w to enhance signaling security mechanisms

The IEEE Standards Board has ratified IEEE 802.11w-2009, Standard for Information Technology-Telecommunications and Information Exchange between systems-Local and Metropolitan …

Don't miss

Cybersecurity news