EMC builds SharePoint security and availability
As organizations see SharePoint deployments rapidly expand, the platform becomes a more strategic and valuable asset that requires closer governance and an ability to identify …
Whitelisting for Microsoft Hyper-V
Solidcore has extended the whitelisting capabilities of its S3 Control software to secure Microsoft Hyper-V virtual environments. Solidcore S3 Control uses combined …
Podcast: Cloud Security Alliance
The Cloud Security Alliance (CSA) is a non profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and …
Agentless configuration auditing for virtualized infrastructure
nCircle announced that its Configuration Compliance Manager (CCM) configuration auditing solution now audits the full VMware virtual infrastructure, from virtual machines to …
Q1 2009: 302,000 computers infected with malware to redistribute spam
PandaLabs announced that less than seven percent of emails that reached companies in the first quarter of 2009 were legitimate correspondence. Some 91 percent of messages were …
Photos: Qualys at RSA Conference 2009
Here’s a look at the Qualys booth #1717 at the RSA Conference 2009 expo. The speakers are outstanding: Guest speakers Brad Freeman, Global Security Services Leader, …
Key practices for secure adoption of cloud computing
The information security industry is taking on the task of providing guidance to enable secure Cloud Computing with today’s formal launch of the Cloud Security Alliance. …
Firefox 3.0.9 fixes many security issues
Mozilla just released Firefox 3.0.9 that fixes several security issues. Firefox allows Refresh header to redirect to javascript: URIs When a server responds with a Refresh …
Strong authentication for mobile devices from VeriSign
With two-factor authentication gaining traction among major online businesses and consumers worldwide, a new “test drive” program announced at the 2009 RSA …
DeviceLock 6.4 retooled with new content processing engine
DeviceLock announced the release of DeviceLock 6.4. With this release, DeviceLock adds true file type detection and filtering – the first deep data analysis feature …
New version of proactive network security management platform
Stonesoft unveiled StoneGate 5.0, its proactive network security management platform. Stonesoft is the only vendor to provide a single centralized command center for proactive …
Survey: Majority of firms plan to maintain or increase IT security spending
According to CompTIA’s 7th Annual Trends in Information Security survey, the majority of firms in the US and abroad plan to increase or maintain spending on IT security …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous