Please turn on your JavaScript for this page to function normally.
MultiFactor SecureAuth for Cisco VPN access enables PCI compliance

MultiFactor announced the availability of SecureAuth 4.5 for Cisco VPN Authentication, a secure access solution addressing specific PCI compliance requirements for large …

Q&A: The DNSChanger Trojan

Christoph Alme is the Principal Engineer and Team Lead of anti-malware research at Secure Computing Corporation. He is the inventor of several patent-pending key technologies …

APSolute Immunity provides networks with ability to fight emerging threats

Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …

More malicious attacks on the Threat Horizon

The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …

Malware growth at a higher level than ever before

In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …

New book: “Your Brain: The Missing Manual”

Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …

Multiple vulnerabilities in Ruby

Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …

Research pinpoints how institutions should respond to data breaches

Javelin Strategy & Research announced today results from a new study covering data breach victims, which highlights the acute awareness among consumers about data …

Lack of visibility and control puts enterprise network resources at risk

Nearly 50% of enterprises believe employees and non-employees have access to data that is not relevant to their job function according to a recent survey the company …

New mobile antivirus and firewall solutions

Sybase iAnywhere today announced that it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities. Sybase Information Anywhere …

C2 Systems: No Longer a Proprietary Issue

The past five years have seen remarkable transformation in how military Command and Control (C2) systems are designed and procured. Proprietary and costly custom developed …

The demand for RFID and biometric security solutions

Government and security agencies worldwide increasingly demand high-tech solutions to secure their borders. In response, the security industry is developing technology that …

Don't miss

Cybersecurity news