Please turn on your JavaScript for this page to function normally.
Centennial Software acquired by FrontRange Solutions

FrontRange Solutions has acquired Centennial Software. Centennial a developer of dynamic infrastructure management products, including auto-discovery, inventory management and …

Hitachi ID releases ID-Archive 5.0

Hitachi ID Systems released ID-Archive 5.0 that builds on technology from the next generation Hitachi ID Management Suite to offer more secure and robust infrastructure for …

Password management solution with hardware-based encryption

Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …

Alleged webcam hacker accused of spying on girls

IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …

Virtualization technology enables secure wireless access

Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …

Exaprotect unveils LogManager 3.0

Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …

BIO-key granted image identification system patent

IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …

Free tool for P2P-related file discovery

With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …

Majority of users leave their wireless networks exposed

Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …

Info on Gartner’s IT Security Summit 2008

New generations of technology-savvy users and a growing wave of gadget-prone communication devices are making their way into the workplace, bringing with them new security …

User authentication SDK for e-commerce portals

The online shopping trend is growing by leaps and bounds. At the same time, e-commerce portals for managing customers and employee extranets are gaining increasing importance. …

Nigerian scam goes 2.0 – targets LinkedIn and other social networking sites

Researchers from BitDefender have detected that social networks are the newest medium for Nigerian “4-1-9” scams. The scam has been put to use on the professional …

Don't miss

Cybersecurity news