Please turn on your JavaScript for this page to function normally.
New Mantra with new data discovery and database security features

Tizor Systems announced Mantra 6 with updated features for data discovery, database security and ease of use. Mantra 6 features include automated discovery for finding …

RSA unveils advancements to the RSA Data Security System

RSA announced new capabilities in their Data Security System’s encryption and key management suite which are designed to secure sensitive data in file systems. RSA File …

Cyber Security Coordination

There’s been much discussion of late regarding the perceived lack of expediency by federal agencies to identify and prioritize critical cyber infrastructure needs. The …

Mobile surveillance platform for facilities security and law enforcement

Phoenix Worldwide Industries introduced a rapidly deployable, intelligent surveillance platform targeted toward municipalities, law enforcement and certified security …

10 Gig threat management system protects critical IP services

Arbor Networks announced a 10 Gig DDoS detection and mitigation system that enables application-layer attack protection. The Threat Management System 3100 (TMS) delivers deep …

New ForeScout CounterACT features PCI compliance kit

The payment card industry established the PCI DSS for the protection of cardholder information in response to widely publicized security breaches. Enforced through compulsory …

Q&A: iPhone Security and the Enterprise Market

Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community …

Third Brigade acquires open source host intrusion detection project

Third Brigade has acquired OSSEC, an open source, host-based intrusion detection system. The OSSEC project produces a multi-platform, scalable, host-based intrusion detection …

Network security change workflow solution

AlgoSec launched FireFlow, an-end-to-end policy change workflow solution which automates what is often a disjointed and manual process to ensure that changes to network …

Mismatch between IT security challenges and deployed solutions

The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …

Sophos assists computer crime unit in a botnet master case

Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley.  The hacker, of Panama City, Florida, who went by the alias …

Virtual worlds face malware reality check

Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …

Don't miss

Cybersecurity news