Updated research of the largest base of real-world vulnerability data
Wolfgang Kandek, CTO of Qualys, today unveiled Laws of Vulnerabilities 2.0 derived from the industry’s largest vulnerability dataset. The Laws 2.0 reveals vulnerability …
Microsoft outlines progress towards a safer Internet
Microsoft discussed progress toward enabling End to End Trust, the company’s vision for a safer, more trusted Internet first introduced at last year’s event. In …
RSA provides transparent authentication to enterprises
The new release of the RSA Adaptive Authentication platform is designed for large, distributed enterprise environments and helps to identify users using self-learning risk …
Ubuntu 9.04 has been released
Ubuntu 9.04 Desktop Edition delivers a range of feature enhancements to improve the user experience. Shorter boot speeds, some as short as 25 seconds, ensure faster access to …
Corporations adjust to deal with IT security with reduced budgets
The worst downturn in a generation is forcing organizations to adapt to reduced budgets at the same time as facing increased threats and greater scrutiny through new …
Photos: RSA Conference 2009 expo #3
Here’s another glance at the RSA Conference 2009 expo floor. The featured companies are: SSH, Venafi, SenSage, MBX, Marshal8e6, Sophos, CA and Oracle. The first and …
First two-factor universal personal authenticator for mobile phones
FireID launched in the US its universal personal authenticator that turns any mobile phone into a convenient and powerful self-contained, one-time-password (OTP) generator to …
Set of single sign-on, authentication and provisioning solutions
Passlogix released version 7.0 of the Passlogix v-GO Access Accelerator Suite, an integrated set of single sign-on, authentication and provisioning solutions that includes a …
EMC builds SharePoint security and availability
As organizations see SharePoint deployments rapidly expand, the platform becomes a more strategic and valuable asset that requires closer governance and an ability to identify …
Whitelisting for Microsoft Hyper-V
Solidcore has extended the whitelisting capabilities of its S3 Control software to secure Microsoft Hyper-V virtual environments. Solidcore S3 Control uses combined …
Podcast: Cloud Security Alliance
The Cloud Security Alliance (CSA) is a non profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and …
Agentless configuration auditing for virtualized infrastructure
nCircle announced that its Configuration Compliance Manager (CCM) configuration auditing solution now audits the full VMware virtual infrastructure, from virtual machines to …
Featured news
Sponsored
Don't miss
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
- Thinking outside the code: How the hacker mindset drives innovation
- Cybersecurity jobs available right now: April 17, 2024
- Damn Vulnerable RESTaurant: Open-source API service designed for learning
- Understanding next-level cyber threats