Help Net Security
Centennial Software acquired by FrontRange Solutions
FrontRange Solutions has acquired Centennial Software. Centennial a developer of dynamic infrastructure management products, including auto-discovery, inventory management and …
Hitachi ID releases ID-Archive 5.0
Hitachi ID Systems released ID-Archive 5.0 that builds on technology from the next generation Hitachi ID Management Suite to offer more secure and robust infrastructure for …
Password management solution with hardware-based encryption
Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …
Alleged webcam hacker accused of spying on girls
IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P’, automatically generate an exploit for the potentially …
Virtualization technology enables secure wireless access
Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …
Exaprotect unveils LogManager 3.0
Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …
BIO-key granted image identification system patent
IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …
Free tool for P2P-related file discovery
With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …
Majority of users leave their wireless networks exposed
Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …
Info on Gartner’s IT Security Summit 2008
New generations of technology-savvy users and a growing wave of gadget-prone communication devices are making their way into the workplace, bringing with them new security …
User authentication SDK for e-commerce portals
The online shopping trend is growing by leaps and bounds. At the same time, e-commerce portals for managing customers and employee extranets are gaining increasing importance. …
Featured news
Resources
Don't miss
- Why security culture is crypto’s strongest asset
- Why remote work is a security minefield (and what you can do about it)
- Trump orders revocation of security clearances for Chris Krebs, SentinelOne
- FortiSwitch vulnerability may give attackers control over vulnerable devices (CVE-2024-48887)
- How to find out if your AI vendor is a security risk