Please turn on your JavaScript for this page to function normally.
HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”

June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …

Insider threats keep IT directors awake at night

Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …

Preparations for secure collaboration in a de-perimeterized business world

Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …

Full disk encryption for the Mac platform

Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …

When it comes to data breaches business owners have false sense of security

A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an …

SonicWALL updates its SSL VPN appliances

SonicWALL released flexible new enhancements to its SSL VPN product line, making it even easier for small to mid-size businesses to use and manage their secure remote access …

Centralized management with intuitive graphical monitoring

Stonesoft introduced StoneGate Management Center 4.3 for advanced centralized management which offers a fully customizable, graphical monitoring portal, an executive summary …

Internet-enabled live streaming solution for crisis management

ICOP announced the commercial launch of ICOP LIVE, a wireless, audio and video streaming solution designed to provide real-time situational awareness to first responders, …

SSH Tectia Server 6.0 for IBM z/OS has been released

SSH announced the general availability of SSH Tectia Server 6.0 for IBM z/OS. SSH Tectia Server for IBM z/OS is an advanced, cost-effective, secure file transfer solution for …

Block privileged users from accessing sensitive data

Role-based access and other built-in DBMS controls are designed to prevent end-users from accessing sensitive data in databases, but they cannot prevent DBAs and other …

Nasty new worms and adware pests

This week’s PandaLabs report focuses on the Xp-Shield adware and the Ridnu.H and DisaCKT.B worms. Xp-Shield is an adware (or advert-displaying program) which tries to …

Spammers capitalise on Manchester United win to trick unwary fans

Sophos is warning Manchester United fans keen to bask in their team’s glory to be wary of unsolicited emails following the discovery of a spam campaign that contains the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools