HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”
June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …
Insider threats keep IT directors awake at night
Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …
Preparations for secure collaboration in a de-perimeterized business world
Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …
Full disk encryption for the Mac platform
Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …
When it comes to data breaches business owners have false sense of security
A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an …
SonicWALL updates its SSL VPN appliances
SonicWALL released flexible new enhancements to its SSL VPN product line, making it even easier for small to mid-size businesses to use and manage their secure remote access …
Centralized management with intuitive graphical monitoring
Stonesoft introduced StoneGate Management Center 4.3 for advanced centralized management which offers a fully customizable, graphical monitoring portal, an executive summary …
Internet-enabled live streaming solution for crisis management
ICOP announced the commercial launch of ICOP LIVE, a wireless, audio and video streaming solution designed to provide real-time situational awareness to first responders, …
SSH Tectia Server 6.0 for IBM z/OS has been released
SSH announced the general availability of SSH Tectia Server 6.0 for IBM z/OS. SSH Tectia Server for IBM z/OS is an advanced, cost-effective, secure file transfer solution for …
Block privileged users from accessing sensitive data
Role-based access and other built-in DBMS controls are designed to prevent end-users from accessing sensitive data in databases, but they cannot prevent DBAs and other …
Nasty new worms and adware pests
This week’s PandaLabs report focuses on the Xp-Shield adware and the Ridnu.H and DisaCKT.B worms. Xp-Shield is an adware (or advert-displaying program) which tries to …
Spammers capitalise on Manchester United win to trick unwary fans
Sophos is warning Manchester United fans keen to bask in their team’s glory to be wary of unsolicited emails following the discovery of a spam campaign that contains the …
Featured news
Resources
Don't miss
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- Trojanized KeePass opens doors for ransomware attackers
- Closing security gaps in multi-cloud and SaaS environments
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late