Please turn on your JavaScript for this page to function normally.
Security code review service for threat identification

Comsec Consulting launched CODEFEND, a new application security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat …

Users voice key factors of virus protection

In an online survey conducted during May 2009, 9325 surfers told IT security specialist Avira about the criteria they use when choosing their virus protection. International …

First vascular recognition solution to earn certification

Fujitsu announced that the Fujitsu PalmSecure vascular biometric authentication technology has been certified under the International Common Criteria for Information …

85% of US organizations hit by one or more data breaches within the last 12 months

PGP Corporation announced the results from The Ponemon Institute’s fourth annual study on encryption usage in the enterprise – The 2009 Annual Study: U.S. …

Trend Micro’s protection for virtual machines

Trend Micro is expanding its virtualization security portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines …

Firewall management app turns firewalls back into network security devices

Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …

Criminals use enterprise strategies to conduct attacks

Cisco released their 2009 Midyear Security Report, which shows that Internet criminals are increasingly operating like successful businesses, borrowing some of the best …

Microsoft releases 6 security updates

Another Patch Tuesday and Microsoft comes out with security updates for ActiveX, DirectX, ISA Server 2006, Office Publisher, Virtual PC, Virtual Server and Windows. Two of the …

Cyberduck 3.2.1 released

Cyberduck, the FTP, SFTP, WebDAV, cloud files and Amazon S3 browser for Mac OS X, has reached version 3.2.1. The changes in the release include: Create placeholder objects for …

Video: June 2009 threat webscape

June was a huge month for malicious email campaigns. There was a big rise in the volume of malicious messages sent, and many companies were hit by spear phishing campaigns. …

SmartWorkflow: New security management software blade

Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their security infrastructure with policy change …

New book: “Web 2.0 Architectures”

Web 2.0 is more pervasive than ever, but business analysts and technologists are still struggling to comprehend what it can offer them. So what exactly is it–a marketing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools