Please turn on your JavaScript for this page to function normally.
PCI compliance is not achievable without source code analysis

Application security expert Jack Danahy, co-founder and CTO for Ounce Labs, today asserted that source code analysis is the only means possible to conclusively claim …

Billing records theft at University of Utah Hospitals & Clinics

The University of Utah Hospitals & Clinics informed its patients about the recent theft of billing records and to provide them with resources to protect their …

Small Business Information Security Act of 2008 introduced

Yesterday, leading Members of both the House and Senate Small Business Committees introduced the Small Business Information Security Act of 2008, S. 3102 and H.R. 6206. This …

Video – Cyber attack in Estonia

In spring 2007, Estonia’s banks and newspapers were shut down by an organized wide-scale cyber-attack using botnets.

iVISION security camera series

CIS Americas launched the the VCC-V90S Smart Security Camera, a commercial grade, network security camera that uses the Texas Instruments DaVinci Technology platform, with …

Microsoft releases three critical security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …

Physical security for the Cisco Integrated Services Router

Cisco announced a video surveillance solution enabled on the Cisco Integrated Services Router (ISR) platform. By incorporating video surveillance network modules into the …

Two new patents related to firewall security

GraphOn Corporation has been issued two new patents by the U.S. Patent and Trademark Office. U.S. Patent 7,380,273, issued May 27, 2008 describes a method for authenticating a …

New Secure Hybrid Delivery Architecture

Secure Computing unveiled Secure Hybrid Delivery Architecture for Web protection. Customers may now gain access to best-of-breed Web security through solutions that can …

VeriEye SDK enables development of biometric iris recognition systems

Neurotechnology VeriEye SDK features an advanced iris recognition algorithm that rapidly detects and compensates for partial obstructions, irregularities and deformations in …

BufferZone Pro security virtualization technology gets an update

Trustware unveiled a new version of its powerful security software application, BufferZone Pro 3.0. By creating a “buffer zone” between the Internet and the …

Cyber crime feared more than burglary

AVG Technologies released the results of its own research study that showed U.S. citizens are more concerned about being the victims of cyber crime than burglary or assault. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools