Please turn on your JavaScript for this page to function normally.
Snort 2.8.4 is now available

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …

Microsoft report shows rogue security software a top threat

Microsoft released the sixth volume of its Microsoft Security Intelligence Report, which showed a significant increase in rogue security software and evidence that threats are …

2009 brings worms and more worms

According to F-Secure, the biggest malware story of 2009 so far has been the Conficker (aka Downadup) worm. It is a classic worm exploiting vulnerabilities in Microsoft …

21 million personal card readers delivered in Europe

Xiring announces the 2009 market figures for strong authentication solutions. In total 21 million bank card based strong authentication solutions have been delivered in Europe …

National Security Council senior director to keynote RSA 2009

RSA Conference announced that Melissa Hathaway, Acting Senior Director for Cyberspace for the National Security Council (NSC) and Homeland Security Council (HSC), will deliver …

Survey shows configuration management is critical but organizations aren’t investing in it

Shavlik Technologies announced results of a survey the company recently conducted with responses from over 435 IT operations and security specialists. The survey illustrates …

Drobo Pro: self-monitoring and self-healing functionality

Data Robotics introduced DroboPro, which delivers a simplified storage experience enhanced by advanced self-monitoring and self-healing functionality that enables businesses …

Digital signage: A sustainable advantage

The results from an extensive study into the carbon emissions of digital signage compared with those of traditional signage, released today, show that the carbon consumption …

Port and peripheral device security with Zlock

Zecurion released Zlock 2.5, a network endpoint solution that controls and manages computer ports and peripheral devices across the enterprise. Zlock 2.5 monitors and manages …

PGP unveils new encryption solution

PGP Corporation announced PGP Whole Disk Encryption Workgroup Edition, a full disk encryption solution specifically designed for small businesses and workgroup environments …

Turn mobile phones into hardware tokens

Celestix Networks released their HOTPin Two-Factor Authentication (2FA) system that employs mobile phones and Windows devices as high-security hardware tokens. HOTPin is an …

New storage solution from Netgear: ReadyNAS NVX

Netgear announced the addition of several new 4-bay storage appliances to its family of ReadyNAS products. The ReadyNAS NVX, which is designed for home offices, workgroups and …

Don't miss

Cybersecurity news