Please turn on your JavaScript for this page to function normally.
Security and compliance management for the cloud

eIQnetworks announced new features within its SecureVue security and compliance management platform solution that identify security concerns within virtualized cloud …

Are businesses prepared for disaster recovery, or do they just think they are?

Symantec announced the findings of its 2009 SMB Disaster Preparedness Survey (which included more than 1650 respondents from 28 countries in North America, EMEA, Asia Pacific …

The growth of online drug brand abuse

MarkMonitor released the latest Brandjacking Index, which finds a parallel online system of pharmaceutical supply and demand fueled by continued growth in listings for …

Portable multi-boot security suite Katana 1.0 beta released

Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …

McAfee and Adobe form security alliance

McAfee and Adobe announced a global alliance partnership to deliver new comprehensive security solutions to both companies’ customers. They will deliver an integrated …

Software-based threat detection solution

Guidance Software announced EnCase Cybersecurity, designed for information security, network defense and incident response teams who are tasked with protecting sensitive or …

IronKey Personal

Military-grade hardware encryption safeguards your personal files while stealth Web browsing, anti-malware and password management protect your privacy and prevent identity …

Video: OWASP top 10 security vulnerabilities

Below you can watch two videos with a talk on OWASP top 10 security vulnerabilities, given by Barry Dorrans at the UK Vista Squad user group meeting in London. Update …

Businesses risk data loss as backup is overlooked

Small and medium enterprises (SMEs) are putting data at risk according to recent research by Buffalo Technology. Worrying results indicate that data backup is being ignored …

New book: “Programming Cocoa with Ruby”

Programming Cocoa with Ruby brings together two enthusiastic development communities. Ruby programmers will tell you how productive they are with just the right amount of …

Video: Anti-malware testing

Rik Ferguson from Trend Micro talks about a new third party anti-malware testing methodology that better reflects today’s real-world conditions.

Process Hacker 1.5 released

Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show …

Don't miss

Cybersecurity news