Please turn on your JavaScript for this page to function normally.
How did PC users protect themselves against viruses ten years ago?

Avira surveyed 5,543 international web surfers to find out how they dealt with the issue of IT security ten years ago, when the number of computer attacks rose sharply. The …

Real-time traffic intelligence and security of large IP networks

Narus announced a new release of NarusInsight, its real-time traffic intelligence system. This latest version introduces customizable monitoring capabilities, powerful …

Sophos Free Encryption

Sophos Free Encryption lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected …

Forensic toolkit delivers speed, analytics and scalability

AccessData announced the release of version 3 of Forensic Toolkit, a solution that delivers enhanced analytics, remote device acquisition and expanded reporting options. GUI …

Video: How to steal a botnet

Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A …

Desktop virtualization and security survey

Imprivata conducted a national survey targeting executives across a wide array of industries (including healthcare, financial services, state and local governments agencies) …

Oracle releases version 9 of Application Testing Suite

Oracle announced version 9 of the Oracle Application Testing Suite, an integrated solution for load testing, functional testing and test management, enabling customers to …

VLC 1.0.2 fixes security issue

After almost 2 months and 27 million downloads of VLC 1.0.1, VideoLAN released VLC 1.0.2 introduces many fixes, notably for SSA decoding, v4l2, MacOS interface, ogg/theora, …

Cisco IOS Software NTP packet vulnerability

The Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. NTP runs over UDP, which in turn runs over IP. When a Cisco IOS Software …

Book giveaway: Get some free knowledge!

NOTE: The contest is now over, the winners have been notified. This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving …

Complimentary tool for measuring organizations’ breach index

Today breach notification regulations take effect under the HITECH Act. HIPAA-covered entities, including healthcare providers and business associates, are now required to …

Trends transforming IT in 2010

The Burton Group has identified IT trends that will ultimately affect enterprise IT practices and strategy. The trends will also bring business and technology stakeholders …

Don't miss

Cybersecurity news