Please turn on your JavaScript for this page to function normally.
WordPress two-factor authentication with low-cost YubiKey USB token

WordPress is a versatile platform used by a large number of bloggers worldwide. This article will show you how to power up your WordPress installation with a low cost …

The security and privacy paradox: Getting it right

Privacy is considered a human right in Europe and to this extent organizations have focused on protecting the privacy of their customers’ data. However, there’s a …

TweetGrade: online user reputation on Twitter

Purewire launched TweetGrade, which provides a quantitative assessment of a user’s reach and influence in the Twitter community, and it helps people understand a …

DeviceAnywhere introduces Palm Pre to its developer network

DeviceAnywhere added the new Palm Pre phone to its network of 2000+ feature phones and smartphones available over the DeviceAnywhere platform and accessible by organizations …

New book: “The Twitter Book”

Given the intense media spotlight shining on Twitter right now, chances are if you haven’t twittered yet, you’re probably considering it. So what is Twitter? Why …

Netbook privacy filter from 3M

3M announced a new range of privacy filters specifically designed for the netbook market. New Vikuiti Netbook Filters from 3M, initially available to fit 8.9″ and …

Web application security myths

In the latest episode of the HNS Podcast, Mandeep Khera from Cenzic shares his views on various myths in the field of web application security. To listen to the podcast, click …

First iPhone WLAN management application

E(z)RF OnTheGo is the first wireless LAN management application available on a smartphone, has been introduced by Meru Networks for the Apple iPhone. Network administrators …

Kerberos 5 Release 1.7 is now available

Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free …

Event-based forensics on wireless LANs

E(z)RF Network Manager 2.0, the first wireless LAN management system to record every client-network wireless protocol interaction, rather than merely gathering aggregate …

Cloud computing security and current market trends

Qualys CEO Philippe Courtot discusses cloud computing security and current market trends.

Gartner survey shows worldwide IT budgets to decline 4.7 percent this year

In the first quarter of 2009, CIOs experienced significant IT budget revisions as executives gained a greater understanding and solidified plans for addressing the global …

Don't miss

Cybersecurity news