Please turn on your JavaScript for this page to function normally.
Top security threats and trends for 2007

Organizations saw an increase in targeted attacks in 2006 and a new survey shows the majority of IT professionals (67 percent) expect even more zero-day threats in 2007. …

Six step security resolution for the New Year

Application Security CTO Aaron Newman recommends that vulnerabilities associated with data – not amorphous threats or specific technology weaknesses – be the …

IBM Internet Security Systems discovers Veritas NetBackup vulnerability

IBM announced that its Internet Security Systems X-Force research and development team has discovered and pre­emptively protected customers from a vulnerability in …

CAN-SPAM Act continues to come up short in efforts to curb unsolicited email

Despite the upcoming three-year anniversary of the federal CAN-SPAM act, Barracuda Networks reports that spam is showing no signs of slowing down. The CAN-SPAM act of 2003 …

AlgoSec Firewall Analyzer helps with HIPAA compliance

AlgoSec announced that three additional major US Healthcare organization have recently installed the industry leading AlgoSec Firewall Analyzer (AFA) to meet Health Insurance …

Imperva Extends Operations into Europe

Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for Europe, the Middle East, and Africa (EMEA). Mepsted will …

CyberGuard 1.0 information protection tools at your fingertips

CyberGuard arms you with a powerful arsenal of tools that let you encrypt files using asymmetric encryption, erase your internet and computer usage tracks, shred files with …

Access Smart’s Power LogOn passes rigorous hacker proof test program

Access Smart announced today that Elite Development Group (EDG), a leading Orange County security solutions provider, has given Access Smart’s Power LogOn password …

Botox And IT Security – Is It Too Late For You?

As a fifty something male, personal grooming takes on whole new meaning. You realize that when you start typing “Botox” on Google that things are getting serious. …

Positive Networks launches PositivePRO Version 3.5

Positive Networks introduced PositivePRO 3.5, the newest version of the company’s award-winning secure remote access service.  Its users receive regular updates as …

Official (ISC)2 guide to the CISSP CBK now available

The International Information Systems Security Certification Consortium, Inc. [(ISC)2] announced the publication of the Official (ISC)2 Guide to the CISSP CBK a comprehensive …

Full suite of solutions to meet web application security needs for any size company

Cenzic introduced two new products to protect small enterprises from vicious hackers. Hailstorm Starter and Hailstorm Core are based on Cenzic’s award-winning Hailstorm …

Don't miss

Cybersecurity news