Please turn on your JavaScript for this page to function normally.
2009 to see more malware on virtualization platforms and mobile devices

AppRiver published of its year-end spam report, State of Security 2008, and the Threat and Spamscape Forecast for 2009. According to report author, AppRiver Senior Security …

IBM unveils Rational AppScan Standard Edition 7.8

IBM Rational AppScan Standard Edition is a Web application security testing tool that automates vulnerability assessments. Here’s a short list of the interesting new …

Tackling the authentication nightmare

In the new edition of the HNS podcast, Jonathan Craymer, chairman of GrIDsure talks about tackling the authentication nightmare by getting the right balance between security …

Anonymous proxies a major security concern for IT managers

Web filtering specialist Bloxx announced the results of its independent Anonymous Proxy Survey, which reveals that an alarming 90% of IT Managers in the educational sector …

IT security standards planetarium

atsec information security today published the “IT security standard planetarium”, which depicts the relationships among many IT security standards. You can choose …

New Deep Security server and application protection software

Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …

Less than six weeks till SCALE 7X

Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …

Burglar arrested as police post CCTV images on Facebook

Sophos informs us that police in New Zealand have used popular social networking website Facebook to aid their criminal investigations, following the arrest of a 21-year-old …

Network Security Toolkit 1.8.1 has been released

The Network Security Toolkit is a bootable ISO live CD/DVD is based on Fedora 8. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security …

Video: Practitioner’s guide to capturing and analysis of RAM

Embedded below is Dale Beauchamp’s talk “Practitioner’s guide to capturing and analysis of RAM” from January 8th’s DojoSec event.

Security and other factors will dominate outsourcing decisions in 2009

The end-user, the economy, security requirements and the environment will be among the leading factors influencing enterprise clients’ technology outsourcing decisions …

New Cisco Aironet 1140 Series Access Point

Cisco announced the Aironet 1140 Series Access Point, the only dual-radio platform that combines full 802.11n Draft 2.0 performance (up to nine times the throughput of …

Don't miss

Cybersecurity news