Please turn on your JavaScript for this page to function normally.
The effectiveness of IT investments

Whilst economic pressures have put the spotlight on short-term IT cost savings, according to a new report by Butler Group, of even greater significance is the longer-term …

New version of Atlas Internet monitoring system

Arbor Networks unveiled the new ATLAS Internet monitoring system which has been enhanced to look beyond security-related events. It now includes real-time global Internet …

Microsoft releases three security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches that fix vulnerabilities targeting Windows. Security updates are available here and users are …

Very few properly protect their identities online

Sophos is urging all computer users to assess the strength of their passwords and ensure that they are choosing unique and multiple passwords for every different sensitive …

Updated Unified Compliance Framework released

Network Frontiers released their Q1 2009 Unified Compliance Framework (UCF) update. The Q1 2009 release highlights new government and industry wireless security guidelines and …

Photos from InfoSec World 2009

InfoSec World 2009 Conference & Expo features over 100 sessions, 11 content tracks, dozens of case studies and live demos, 15 in-depth workshops, 3 co-located summits and …

10 million actively exposed to identity theft in 2008

PandaLabs announced the findings from a comprehensive identity theft study. Based on the analysis of 67 million computers during 2008, PandaLabs revealed that 1.1 percent of …

Open source software is getting a bad rap on security

Ounce Labs believe that the recent spate of criticism from security vendors about open source software is off-base, and in many cases, counterproductive to security. According …

Video: The problem with cyberwar

In the video below you can watch Marcus J. Ranum give a talk on cyberwar and the failure of the notion. The video was taken at this month’s DojoSec Monthly Briefings.

Real-time face identification using video surveillance cameras

Neurotechnology released VeriLook Surveillance SDK, a software development kit for biometric face identification using live video streams from high-resolution digital …

Spam filter for IBM Lotus Notes

SPAMfighter Domino Module for Lotus Notes reached version 1.0. The module is comprised of a core engine powered by signature based filters and algorithms, complemented by a …

Self-encrypting drives based on Trusted Computing Group specifications

Hard drive vendors have started shipping self-encrypting drives based on the Trusted Computing Group’s specifications. Final specifications for client drives, data …

Don't miss

Cybersecurity news