Please turn on your JavaScript for this page to function normally.
Shortcut guide to securing automated file transfers

Realtime Publishers and SSH Communications Security announced the immediate availability of The Shortcut Guide to Securing Automated File Transfers. The new eBook, authored by …

IBM ISS discovers vulnerabilities in CA Storage Management product

IBM announced that its Internet Security Systems (ISS) X-Force research and development team has discovered and preemptively protected customers from two similar, but distinct …

Financial services institutions should consider outsourcing as IT security concerns increase

Financial services institutions should consider outsourcing as IT security concerns increase Company-wide information security used to reside primarily in the realm of arcane …

Email volume set to double in two months unless rate of spam slows

If the amount of spam and viruses being distributed continues to rise at its current rate, the quantity of email traffic online could well double yet again in as little as two …

2007 as year of corporate data leakage concerns and growth of profit-driven spam

Tumbleweed announced the five most pressing messaging security threats that will emerge or continue to plague IT security in 2007. As anticipated, data leakage concerns and …

Sophos acquires Endforce

Sophos announced that it has acquired Endforce, a leader in network access control (NAC) and endpoint security policy compliance solutions for enterprise customers. Sophos …

Automated Scanning vs. The OWASP Top Ten

The OWASP Top Ten is a list of the most critical web application security flaws – a list also often used as a minimum standard for web application vulnerability …

Scam contract killer email blackmails recipients

IT security firm Sophos is warning internet users about a new spam campaign purporting to come from a professional hitman, in an attempt to steal money. The emails claim that …

Hands-on Trusted Computing workshop at RSA Conference 2007

The Trusted Computing Group (TCG), whose open specifications for computing security have been built into an estimated 50 million trusted systems, will host a half-day workshop …

TopDog 802.11n among first selected for Wi-Fi protected setup testbed

Marvell announced that Marvell’s TopDog 802.11n access point solutions and 802.11a/b/g wireless USB client solutions have been selected as part of the Wi-Fi Alliance …

GateKeeper appliance receives EAL2 Common Criteria Certification

Xceedium announced that its flagship GateKeeper appliance was awarded Common Criteria Evaluation Assurance Level 2 (EAL2) certification for meeting strict government IT …

AmbironTrustWave acquires SecurePipe

AmbironTrustWave has acquired SecurePipe, a Lincolnshire, Ill.-based managed security provider. The terms of the deal are confidential.Established in 1996, SecurePipe provides …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools