Help Net Security
Patent on PKI certificate technology
SSH Communications Security, a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell …
Network troubleshooting and remediation with PacketTrap Perspective
PacketTrap Networks announced the availability of PacketTrap Perspective, a new network troubleshooting and remediation solution developed for the single and multiple-site …
Music piracy group member goes to prison
Barry E. Gitarts, 25, of Brooklyn, New York, was sentenced today to 18 months in federal prison after his conviction on May 22, 2008, for conspiracy to commit criminal …
New Intel vPro technology enhances security
Intel Corporation today introduced its third-generation Intel vPro suite of business desktop PC technologies, which among other features enhances security and reduces the time …
Handhelds with integrated biometrics
Law enforcement, military, and Homeland Security personnel looking for fully-integrated mobile identity verification options now have two new tools to better track and locate …
Software escrow strategy for automating intellectual property protection
iForem unveiled its strategy for developing and delivering on-demand, purely-digital Automated Intellectual Property Protection products. iForem’s current and planned …
Business use of Wi-Fi hotspots increases by 46%
iPass released the latest edition of the iPass Mobile Broadband Index, which tracks the wireless use patterns of mobile workers around the world. The report shows worldwide …
US responsible for the majority of cyber attacks
SecureWorks published the locations of the computers, from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the …
Real-time intelligence visualization
Recent decades have seen the widespread adoption of short-range wireless communications, including wireless LANs (Wi-Fi), ultra-wideband (UWB), and RFID. All of these can be …
85% of malware is now distributed through the Web
Webroot released primary research revealing the impact of Web 2.0 on the enterprise. An overwhelming 85 percent of malware is now distributed through the Web, but businesses …
Technology for detection of unlabeled asset’s location
ImageID, a provider of patented image-based supply chain traceability solutions, today announced DUAL (Detection of Unlabeled Asset’s Location), the only currently …
Privileged account password management solution for the Hyper-V environment
Responding to the growth of virtualization deployments in the enterprise, and the need for applications that support this environment, Lieberman Software announced that Random …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes