Please turn on your JavaScript for this page to function normally.
Patent on PKI certificate technology

SSH Communications Security, a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell …

Network troubleshooting and remediation with PacketTrap Perspective

PacketTrap Networks announced the availability of PacketTrap Perspective, a new network troubleshooting and remediation solution developed for the single and multiple-site …

Music piracy group member goes to prison

Barry E. Gitarts, 25, of Brooklyn, New York, was sentenced today to 18 months in federal prison after his conviction on May 22, 2008, for conspiracy to commit criminal …

New Intel vPro technology enhances security

Intel Corporation today introduced its third-generation Intel vPro suite of business desktop PC technologies, which among other features enhances security and reduces the time …

Handhelds with integrated biometrics

Law enforcement, military, and Homeland Security personnel looking for fully-integrated mobile identity verification options now have two new tools to better track and locate …

Software escrow strategy for automating intellectual property protection

iForem unveiled its strategy for developing and delivering on-demand, purely-digital Automated Intellectual Property Protection products. iForem’s current and planned …

Business use of Wi-Fi hotspots increases by 46%

iPass released the latest edition of the iPass Mobile Broadband Index, which tracks the wireless use patterns of mobile workers around the world. The report shows worldwide …

US responsible for the majority of cyber attacks

SecureWorks published the locations of the computers, from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the …

Real-time intelligence visualization

Recent decades have seen the widespread adoption of short-range wireless communications, including wireless LANs (Wi-Fi), ultra-wideband (UWB), and RFID. All of these can be …

85% of malware is now distributed through the Web

Webroot released primary research revealing the impact of Web 2.0 on the enterprise. An overwhelming 85 percent of malware is now distributed through the Web, but businesses …

Technology for detection of unlabeled asset’s location

ImageID, a provider of patented image-based supply chain traceability solutions, today announced DUAL (Detection of Unlabeled Asset’s Location), the only currently …

Privileged account password management solution for the Hyper-V environment

Responding to the growth of virtualization deployments in the enterprise, and the need for applications that support this environment, Lieberman Software announced that Random …

Don't miss

Cybersecurity news