One in four companies report attacks via social networking sites
A recent Sophos poll revealed that 63 per cent of system administrators worry that employees share too much personal information via their social networking profiles, putting …
PGP Encryption Platform extends support to IBM i for Power Systems
PGP Corporation released PGP Command Line for IBM Power Systems in conjunction with its presence this week at Infosecurity Europe 2009 in London. PGP is continuing to extend …
Survey reveals a third of workers can be bribed
Would you sell your company’s secrets to a stranger for a million pounds? That’s the question put to 600 commuters last week at busy London railway stations and a …
New secure VoIP offering from Alcatel-Lucent
More and more organizations are looking to harness the cost-savings offered by VoIP – as well as the productivity benefits of voice-based IP applications – however …
Network security now enabled for latency-sensitive SCADA environments
Apani has entered into a new OEM partnership with Telvent which will offer Apani EpiForce as a security overlay to its OASyS DNA 7.5 Supervisory Control and Data Acquisition …
MI6 drug information loss in Columbia highlights need for portable device encryption policies
The case of an MI6 agent – who apparently left an unencrypted USB stick containing several years worth of drug trafficking intelligence on an airport bus in Columbia …
First bank payment solution for P2P payments in social networking communities
SeerGate is introducing the first payment solution for banks to offer their customers a direct P2P payment service in social networking environments, including Facebook. …
New book: “Security Monitoring”
How well does your enterprise stand up against today’s sophisticated security threats? In Security Monitoring, security experts Chris Fry and Martin Nystrom from Cisco …
Passive RFID Real-Time Location System software application
Mojix announced Mojix Insight, a passive RFID Real-Time Location System (RTLS) software application that provides first tier visibility for asset and process management. Mojix …
Bandwidth shaping and content filtering with Optinet
Black Box Corporation introduces Optinet, a deep packet, Layer 7 inspection gateway appliance that optimizes Internet use, enabling organizations to get the most from their …
DKIM-based CertifiedEmail SDK
Goodmail Systems released the first DKIM-based CertifiedEmail software development kit (SDK). DKIM is an emerging cryptography-based standard for email authentication that …
Salma Hayek’s e-mail account gets hacked
According to reports, the Oscar-nominated actress had her MobileMe account hacked after cybercriminals reset her account password by correctly entering her date of birth and …
Featured news
Resources
Don't miss
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies
- China-linked Murky Panda targets and moves laterally through cloud services