Please turn on your JavaScript for this page to function normally.
Cisco and Citrix partner on networking and cloud

Cisco and Citrix announced an expansion of their desktop virtualization partnership into three strategic areas: cloud networking, cloud orchestration, and mobile workstyles. …

Facebook partners with Panda Security

Panda Security signed a collaboration agreement with Facebook to protect users. Facebook users will be able to download a free 6-month version of Panda Internet Security 2013 …

Time to rethink network management

The acceleration in data speeds and volumes in telecom networks is increasing the need for real-time network management solutions, according to Napatech. Network probes have …

BYOD security and control fears

Enterprises are restricting employee access to vital work applications due to security and control fears, according to Ping Identity. Employees were found to use an average of …

Cloud security application uses electronic fingerprint

Intrinsic-ID launched Saturnus, an application that allows users to protect data with their mobile devices before sending it to the cloud. It is the first application that …

Oracle patches 109 vulnerabilities

Oracle’s Critical Patch Update for October 2012 patches 109 vulnerabilities across hundreds of Oracle products. There are several patches that require immediate …

Cloud-based document security from SealPath

SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …

Seagate unveils three new enterprise-class HDDs

Seagate announced three new enterprise-class hard disk drives optimized for traditional data centers and emerging cloud infrastructures. Perfect for cloud bulk data storage, …

Fortinet unveils FortiOS 5.0 operating system

Fortinet announced FortiOS 5.0, a security operating system that is the foundation for all Fortinet FortiGate integrated security platforms. This new release provides more …

Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

Most people want control of information collected by data brokers

As Congress examines how data brokers collect, aggregate and share consumers’ personal information, a new survey by TrustedID shows that most people are confused about …

Multi-dimensional analytics tool for big data

LogRhythm announced the enhancement of its SIEM 2.0 Big Data security analytics platform with the industry’s first multi-dimensional behavioural analytics. Leveraging …

Don't miss

Cybersecurity news