Please turn on your JavaScript for this page to function normally.
Spammers are leveraging Google applications

BitDefender antispam analysts have detected that Nigerian scam spammers are using a new gateway to target the corporate world: Google Calendar. Nigerian scam spammers are …

SSL VPN technology is enhancing virtual services

Secure Socket Layer (SSL) virtual private networks (VPN) solutions have matured past some of their initial shortcomings, but face consistent restraints such as budget …

Secure Mail next gen email security appliance

Secure Computing announced a new version of its on-premise email security solution, Secure Mail (formerly known as IronMail). This new version is capable of processing more …

fideAS a new file encryption solution

Applied Security has launched its new fideAS enterprise file and folder encryption solution to protect and secure access to sensitive data on fileservers, deskops and laptops …

Guard Against Cyberspace Threats

With the changing nature of threats in cyberspace, the need is growing to absorb attacks and to protect online identities against both high-profile and stealthy infiltration …

QualysGuard receives new vulnerability checks

Each month, Microsoft releases new security patches that may impact devices on your network. Many organizations struggle to understand and prioritize these patches and …

IBM z/OS V1R9 evaluated – Common Criteria certification at EAL4+

atsec information security recently completed the Common Criteria evaluation of IBM z/OS V1R9. The certificate was awarded by Germany’s Federal Office for Information …

Spy dust catches thieves: FBI says “no comment”

Nox Defense has released an invisible perimeter defense technology, which combines high-resolution video pictures and RFID tags, sometimes referred to as “spy …

Research project enhances existing OpenSolaris security functionality

Sun Microsystems and the United States’ National Security Agency (NSA) announced an agreement to jointly work within the OpenSolaris community to research and to develop …

IBM cracks Web 2.0 security concerns with “SMash”

IBM announced new technology to secure “mashups,” web applications that pull information from multiple sources, such as Web sites, enterprise databases or emails, …

Mobile and remote working: is it secure?

The move towards remote and mobile working seems to be an unstoppable trend. Research by ZDNet and Rhetorik found that the penetration of mobile workers across the UK …

Comodo releases full version of Trustix Enterprise Firewall for free

Comodo announced the commercial release of Trustix™ Enterprise Firewall (TEF) version 4.8, a free enterprise class LINUX-based firewall solution. Trustix™ Enterprise …

Don't miss

Cybersecurity news