Centennial Software acquired by FrontRange Solutions
FrontRange Solutions has acquired Centennial Software. Centennial a developer of dynamic infrastructure management products, including auto-discovery, inventory management and …
Hitachi ID releases ID-Archive 5.0
Hitachi ID Systems released ID-Archive 5.0 that builds on technology from the next generation Hitachi ID Management Suite to offer more secure and robust infrastructure for …
Password management solution with hardware-based encryption
Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …
Alleged webcam hacker accused of spying on girls
IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …
Virtualization technology enables secure wireless access
Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …
Exaprotect unveils LogManager 3.0
Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …
BIO-key granted image identification system patent
IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …
Free tool for P2P-related file discovery
With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …
Majority of users leave their wireless networks exposed
Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …
Info on Gartner’s IT Security Summit 2008
New generations of technology-savvy users and a growing wave of gadget-prone communication devices are making their way into the workplace, bringing with them new security …
User authentication SDK for e-commerce portals
The online shopping trend is growing by leaps and bounds. At the same time, e-commerce portals for managing customers and employee extranets are gaining increasing importance. …
Nigerian scam goes 2.0 – targets LinkedIn and other social networking sites
Researchers from BitDefender have detected that social networks are the newest medium for Nigerian “4-1-9” scams. The scam has been put to use on the professional …
Featured news
Sponsored
Don't miss
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)
- GISEC Global 2024 video walkthrough
- GenAI can enhance security awareness training
- The relationship between cybersecurity and work tech innovation