Please turn on your JavaScript for this page to function normally.
NetSupport manager now offers smart card support

NetSupport announced the latest release of NetSupport Manager 10.3 remote control software. The newest release of NetSupport Manager has significant enhancements in the areas …

Instant messaging – see no evil, hear no evil

FaceTime Communications warns that with one in four employees admitting to sending information about company plans, finances or password/login credentials via instant …

Veracode’s application security testing solution for U.S. Government

Veracode announced it has entered into a partnership and reseller agreement with Patriot Technologies. As the “go-to” source for the Federal Government’s …

HNS Podcast: Vulnerability Management Considerations

In this HNS podcast, Anthony Alves from CORE Security Technologies discusses briefly vulnerability management. He covers some of the things you should consider while …

VPN solution for Symbian OS-based mobile devices

NCP provides users of Symbian OS-based mobile devices with secure access to the company network. The new IPSec client can be used, for example, on mobile devices such as the …

iDetector wireless network capabilities

Graphic Security Systems Corporation (GSSC) will include the Eye-Fi Card for its iDetector authentication device. The iDetector attachment utilizes a Canon digital camera as …

Integrated product for fighting online fraud and identity theft

Intellitactics and Radware have joined forces to provide businesses and government agencies a real-time capability to detect fraud and thwart identity theft. This alliance …

New version of ModSecurity open source web application firewall

Breach Security announced the latest version of its open source ModSecurity web application firewall. The latest release, ModSecurity v2.5, offers a significant improvement in …

Book signings at RSA Conference 2008

From the RSA Conference Blog: “Our speakers and panelists are a very prolific group with many titles to their names. Each year our bookstore partner, Digital Guru, …

Empirical Exploitation of Live Virtual Machine Migration

As virtualization continues to become increasingly popular in enterprise and organizational networks, operators and administrators are turning to live migration of virtual …

90% of public websites are vulnerable to attack

WhiteHat Security released the fourth installment of the WhiteHat Website Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a …

Automated system lock down tool for Oracle Enterprise Linux

Trusted Computer Solutions announced that it has become a member of the Oracle PartnerNetwork and now offers organizations that have invested in Oracle Enterprise Linux …

Don't miss

Cybersecurity news