Please turn on your JavaScript for this page to function normally.
VeriSign introduces security upgrades to its Project Titan

VeriSign announced an expansion of its Project Titan initiative to include additional security upgrades aimed at strengthening its global Internet infrastructure. When it …

Malware prevention for Skype

FaceTime Communications announced enhancements to its Greynet Enterprise Manager including detection of malicious URLs entering the enterprise network via Skype instant …

Howard A. Schmidt named (ISC)2 Security Strategist

(ISC)2 announced that information security industry veteran Prof. Howard A. Schmidt, CISSP, has been named (ISC)2 Security Strategist by the board of directors, a role that …

Red Hat Certificate System source code released

Red Hat has just released all of the source code to Red Hat Certificate System. Much of the technology in Red Hat Certificate System was already open source, including the …

Man admits to writing anime trojan horse

Masato Nakatsuji, the 24-year-old who in January became the first ever virus writer to be arrested in Japan, admitted in Kyoto District Court that he created a Trojan horse …

New Firewall Analyzer product suite

AlgoSec announced the availability of the AlgoSec Firewall Analyzer (AFA) product suite. The new suite, which improves the overall security and efficiency of enterprise …

New product: Sophos Endpoint Security and Control 8.0

Sophos announced Sophos Endpoint Security and Control 8.0, incorporating Network Access Control technology to go beyond reactive and proactive anti-virus – offering …

New version of BullGuard Backup

BullGuard released BullGuard Backup 8.0, the second version of its stand-alone backup offering. New features include improved encryption and compression options, a larger …

Identikey Server 3.0 – new authentication solution for large enterprises

VASCO Data Security International announced today that it launches its new authentication server, Identikey Server 3.0. This authentication solution, based on VACMAN’s …

Four key steps every company should take to protect its critical data

Ecora Software outlined a series of safeguards that companies should consider implementing in order to be protected from harm caused by unauthorized access to critical data. …

New versions of Veritas Storage Foundation and Cluster Server 5.1

Symantec announced Veritas Storage Foundation and Veritas Cluster Server 5.1 for Windows, the industry leading heterogeneous storage management and high availability solution …

Spammers are leveraging Google applications

BitDefender antispam analysts have detected that Nigerian scam spammers are using a new gateway to target the corporate world: Google Calendar. Nigerian scam spammers are …

Don't miss

Cybersecurity news