Please turn on your JavaScript for this page to function normally.
Unified Threat Management: what’s next and why

A recent study by the Aberdeen Group suggests that on average, more than 120 new vulnerability disclosures are made each week, nearly 90% of which could be exploited remotely, …

Cybersecurity programs expected to remain strong under next administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration.  But with the election less than two weeks away, one …

8x more malicious email attachments spammed out in Q3 2008

IT security and control firm Sophos has released the results of its investigation into the latest spam trends and revealed the top twelve spam-relaying countries for the third …

New book: “Mac OS X for Unix Geeks”

In the fourth edition of “Mac OS X for Unix Geeks” the authors updated it for Mac OS X 10.5 and tweaked the book to make it even more interesting than before. By …

USB-based PKI device for strong authentication

VASCO Data Security International unveiled the Digipass Key1, a USB-based PKI solution for strong authentication, digital signature and data protection. Digipass Key1, is the …

Video – memory corruption and buffer overflows

This talk by David Aitel was recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 25, 2008. Dave Aitel is CEO and founder of Immunity Inc., and …

Photo safeguards confidential information

These days you can take a photograph with almost every mobile phone. However, using this sort of photo to protect confidential data and send it safely is something new. Ileana …

Extreme Rugged system features Core 2 Duo and GME965 chipset

ADLINK Technology announced availability of the industry’s first Extreme Rugged system based on the Intel Core 2 Duo processor and GME965 chipset. The Ampro by ADLINK …

Lockheed Martin establishes Center for Cyber Security Innovation

Lockheed Martin announced the establishment of its new Center for Cyber Security Innovation (CCSI). The center of excellence represents an evolution for the company and its …

Video: OWASP application security industry outlook panel discussion

Recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 24, 2008.

New release of Oracle Adaptive Access Manager

Oracle released OracleAdaptive Access Manager 10g Release 3. Key highlights include: Enhanced Auto Learning — highly advanced statistical evaluation techniques that …

Cyber-Ark updates its Inter-Business Vault

Cyber-Ark Software announced the availability of version 5.0 of the Inter-Business Vault (IBV), its widely-used Managed File Transfer solution that provides both business and …

Don't miss

Cybersecurity news