Please turn on your JavaScript for this page to function normally.
New Worry-Free Security Solutions

Trend Micro announced the latest versions of its Worry-Free Security Solutions. The newest versions build upon the success of previous versions by extending all-in-one …

Partnership for the next-generation secure signature platform

In preparation for the federal government’s 2008 IPv6 deadline, Command Labs, the research and development arm of Command Information announced a development deal with …

Sophos Application Control blocks Windows games

Sophos has announced that its Application Control software has been extended to give businesses the ability to control and block Windows computer games, including Solitaire, …

F-Secure delivers steady growth

Steady and profitable growth continued across all business segments in anti-virus and intrusion prevention. In 2006 total revenues were 80.7m (61.8m), representing 31% growth. …

CRYPTOCard completes Citrix compatibility verification

CRYPTOCard joined the all-new Citrix Ready initiative that has been developed by Citrix Systems, Inc. to help customers identify third-party solutions that add value in …

Protegrity joins the PCI Security Standards Council

Protegrity Corporation has been accepted as a participating member of the PCI Security Standards Council. The PCI Security Standards Council develops, maintains and oversees …

DeepNines acquires Captus Networks

Deep Nines announced that it has acquired Captus Networks. Captus Networks develops inline, policy-based intrusion prevention systems for securing and managing …

CORE IMPACT named “Hot Pick” by Information Security

Core Security Technologies announced that CORE IMPACT has been named a Hot Pick by Information Security. In a hands-on product review published in the January 2007 issue, …

Ajax Fingerprinting for Web 2.0 Applications

Fingerprinting is an age old concept and one that adds great value to assessment methodologies. There are several tools available for fingerprinting operating systems (nmap), …

Log Management – Lifeblood of Information Security

The responsibility to protect sensitive private information is now legally mandated and has become a key focus for many regulations within multiple industries. Information …

MySpace.com security patch failed, users at risk

Chapin Information Services discovered that efforts by MySpace.com to repair its website last year were inadequate to protect users from a new type of Internet attack. Using …

Mismanagement of privileged passwords costs enterprises millions

Cyber-Ark announced the release of new research into Privileged Passwords – the non-personal, shared and administrative passwords that exist in virtually every device or …

Don't miss

Cybersecurity news