Please turn on your JavaScript for this page to function normally.
Data integrity and confidentiality at Layer 2

New Soft-MACsec is a modular, portable implementation of the IEEE Std 802.1AE-2006 MACsec standard for network Layer 2 integrity and confidentiality. Soft-MACsec uses a …

New security gateway virtual appliances

Secure Computing announced it is working with VMware to provide customers with security gateway virtual appliances for organizations of all sizes. These appliances for VMware …

Data encryption solution that maintains hard disk bootability

CMS Products announced the inclusion of an innovative new security feature within its BounceBack Professional Disaster Recovery Software. BounceBack Professional soon will …

Centennial Software acquired by FrontRange Solutions

FrontRange Solutions has acquired Centennial Software. Centennial a developer of dynamic infrastructure management products, including auto-discovery, inventory management and …

Hitachi ID releases ID-Archive 5.0

Hitachi ID Systems released ID-Archive 5.0 that builds on technology from the next generation Hitachi ID Management Suite to offer more secure and robust infrastructure for …

Password management solution with hardware-based encryption

Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …

Alleged webcam hacker accused of spying on girls

IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …

Virtualization technology enables secure wireless access

Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …

Exaprotect unveils LogManager 3.0

Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …

BIO-key granted image identification system patent

IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …

Free tool for P2P-related file discovery

With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …

Majority of users leave their wireless networks exposed

Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools