Please turn on your JavaScript for this page to function normally.
Security-hardened key management

Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations …

Syncplicity launches Security and Compliance Console

With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …

Mobile pickpocketing and botnets will rise

Mobile threats are on the rise — Lookout estimates that mobile threats successfully stole more than one million dollars from Android users in 2011. In 2012, Lookout predicts …

Top 5 authentication predictions for 2012

Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …

Cloud computing certification

With the use of cloud computing expanding and the demand for IT workers with cloud skills growing, CompTIA introduced a new specialty certification focused on cloud computing …

Virtualization can transform data protection

According to a Vanson Bourne survey of 500 CIOs virtualization has the potential to transform data protection. In order to achieve this, greater strides need to be made in …

Mobile VPN client for Android

Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …

Microsoft patches 19 vulnerabilities

For the December Patch Tuesday, Microsoft released thirteen security bulletins that fix vulnerabilities targeting Windows, Internet Explorer, and Office. Three are marked as …

The multiple dimensions of corporate espionage

You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …

Confidential data exposure in public spaces

While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal …

Top software failures of 2011

SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to …

Holiday travel is risky business for mobile devices

The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …

Don't miss

Cybersecurity news