Please turn on your JavaScript for this page to function normally.
Optical transaction signing device limits ebanking fraud

SafeNet announced the eToken 3500, an electronic signing and strong authentication token-based device that will enable financial services organizations to achieve risk …

Intelligent information governance from Symantec

In order to enable organizations to better protect their information, establish retention policies and streamline their eDiscovery process, Symantec announced its plans for …

Fortinet releases three new appliances

Fortinet introduced three new members to its FortiWeb Web application firewall product family – the FortiWeb-4000C, FortiWeb-3000C FSX and FortiWeb-400C. The new product …

Top disaster recovery issues

It is no surprise that disaster preparation is top of mind among people these days. The images and stories coming out of Japan following the devastating earthquake and tsunami …

First sub-$50 cloud router

D-Link introduced the first sub-$50 Wi-Fi router with advanced cloud services – the new D-Link Cloud Router (DIR-605L). In addition to bringing cloud-enabled devices to …

Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …

10 years of Microsoft’s Trustworthy Computing Initiative

Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …

Chinese using malware to attack US DoD smart card security

AlienVault found evidence of Chinese-originated attacks against the US government agencies including the US Department of Defense (DoD), which use a new strain of the Sykipot …

Volume and sophistication of attacks to increase

Based on activity levels observed in the second half of 2011, the growing pace, volume and sophistication of attacks suggest consumers, small businesses and corporations will …

Identity intelligence and the complexity of security

An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of …

Secure web gateway protection from Sophos

Virtualization has helped organizations reduce capital and operating costs, while driving greater levels of application availability. It has also yielded benefits in …

Microsoft SharePoint 2010: Deploying Cloud-Based Solutions

Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …

Don't miss

Cybersecurity news