TJX data theft conspirator pleads guilty
A Miami, Florida man was convicted in federal court of conspiring to electronically break into corporate computer networks, download customers’ credit and debit card …
New book: “Googling Security”
Googling Security is the first book to reveal how Google’s vast information stockpiles could be used against you or your business-and what you can do to protect …
In light of new Nevada law data privacy faces significant risk
Beginning October 1, Nevada state law will require all businesses to employ an encryption tool for any electronic transmission that includes a customer’s personal …
DNS firewall capabilities inside hardened operating system
Infoblox did some enhancements to its line of core network services appliances to provide unique DNS security capabilities such as alerting, reporting, and attack mitigation. …
Searching for presidential campaign videos can bring malware
Webroot announced that it has detected malicious software being propagated as campaign videos for John McCain and Barack Obama. Attackers are taking advantage of unsuspecting …
Highest density 10Gbps ethernet carrier-grade MAC aggregator
Dune Networks announced the availability of a new member in its PETRA family, called the P130. The P130 introduces Carrier-Grade MAC functionality, providing 80Gbps MAC, …
WAN optimization client with integrated security
Blue Coat Systems announced the general availability of its Blue Coat ProxyClient software, the first WAN optimization client with integrated security and control. ProxyClient …
Portable solution for critical data extraction
After ten months of successful use by more than 1000 law enforcement and homeland security organizations worldwide, Cellebrite USA launched their Universal Forensic Extraction …
Path to 10Gigabit monitoring
nPulse Network Systems announced PCAP Express 10G, its latest hardware-accelerated implementation of the popular PCAP API. The product extends the functionality of …
Virtual appliance for Nessus Vulnerability Scanner
Tenable Network Security announced the general availability of a virtual appliance for the Nessus Vulnerability Scanner. Tenable’s Nessus Virtual Appliance for VMware is …
New book: “Information Security Law: The Emerging Standard for Corporate Compliance”
Thomas J. Smedinghoff’s “Information Security Law: The Emerging Standard for Corporate Compliance” is the first book to identify the ‘amazing …
New comprehensive identity theft protection solution: IdentitySecure
Affinion Security Center’s new IdentitySecure provides members with a combination of powerful services to protect personal information and financial data. Each feature …