Help Net Security
New Mantra with new data discovery and database security features
Tizor Systems announced Mantra 6 with updated features for data discovery, database security and ease of use. Mantra 6 features include automated discovery for finding …
RSA unveils advancements to the RSA Data Security System
RSA announced new capabilities in their Data Security System’s encryption and key management suite which are designed to secure sensitive data in file systems. RSA File …
Cyber Security Coordination
There’s been much discussion of late regarding the perceived lack of expediency by federal agencies to identify and prioritize critical cyber infrastructure needs. The …
Mobile surveillance platform for facilities security and law enforcement
Phoenix Worldwide Industries introduced a rapidly deployable, intelligent surveillance platform targeted toward municipalities, law enforcement and certified security …
10 Gig threat management system protects critical IP services
Arbor Networks announced a 10 Gig DDoS detection and mitigation system that enables application-layer attack protection. The Threat Management System 3100 (TMS) delivers deep …
New ForeScout CounterACT features PCI compliance kit
The payment card industry established the PCI DSS for the protection of cardholder information in response to widely publicized security breaches. Enforced through compulsory …
Q&A: iPhone Security and the Enterprise Market
Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community …
Third Brigade acquires open source host intrusion detection project
Third Brigade has acquired OSSEC, an open source, host-based intrusion detection system. The OSSEC project produces a multi-platform, scalable, host-based intrusion detection …
Network security change workflow solution
AlgoSec launched FireFlow, an-end-to-end policy change workflow solution which automates what is often a disjointed and manual process to ensure that changes to network …
Mismatch between IT security challenges and deployed solutions
The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …
Sophos assists computer crime unit in a botnet master case
Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley. The hacker, of Panama City, Florida, who went by the alias …
Virtual worlds face malware reality check
Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …
Featured news
Sponsored
Don't miss
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management