Secure authentication of online customers
Concerns about identity theft are escalating. According to the Federal Trade Commission, as many as nine million Americans fall victim to this crime annually, resulting in …
GRC solution automates audit, control and risk functions
MEGA International introduced GRC Suite 3.0. This version is unique in its recognition of the overlap in audit, risk, and control activities; it offers a common platform …
Image-sensing technology for tracking individuals
Fujitsu announced the development of a new image-sensing technology that can thoroughly and accurately track – without blind spots – the motion paths of multiple …
New book: “Programming Amazon Web Services”
The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …
K-12 schools’ cyber safety declines
CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …
Home security, monitoring and automation platform
uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …
Changes to the Nessus Vulnerability Scanner subscription model
Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …
Japanese P2P virus writer convicted, but escapes jail
24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …
New book: “The Book of IMAP”
The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …
IT spending concerns mounting
An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …
E-mail mismanagement puts organizations at risk
E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …
Majority of U.S. consumers are likely to enroll in voice verification
According to a study conducted by Harris Interactive for Nuance Communications, consumers are embracing the use of voice verification in protecting important personal …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!