Please turn on your JavaScript for this page to function normally.
Smart cards advance in IT security, federated identity

The number of U.S. employees using smart card technology to access computers and networks at work continues to grow as enterprises look for better ways to protect information, …

Secure authentication of online customers

Concerns about identity theft are escalating. According to the Federal Trade Commission, as many as nine million Americans fall victim to this crime annually, resulting in …

GRC solution automates audit, control and risk functions

MEGA International introduced GRC Suite 3.0. This version is unique in its recognition of the overlap in audit, risk, and control activities; it offers a common platform …

Image-sensing technology for tracking individuals

Fujitsu announced the development of a new image-sensing technology that can thoroughly and accurately track – without blind spots – the motion paths of multiple …

New book: “Programming Amazon Web Services”

The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …

K-12 schools’ cyber safety declines

CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …

Home security, monitoring and automation platform

uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …

Changes to the Nessus Vulnerability Scanner subscription model

Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …

Japanese P2P virus writer convicted, but escapes jail

24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …

New book: “The Book of IMAP”

The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …

IT spending concerns mounting

An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …

E-mail mismanagement puts organizations at risk

E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …

Don't miss

Cybersecurity news