Please turn on your JavaScript for this page to function normally.
CAN-SPAM Act continues to come up short in efforts to curb unsolicited email

Despite the upcoming three-year anniversary of the federal CAN-SPAM act, Barracuda Networks reports that spam is showing no signs of slowing down. The CAN-SPAM act of 2003 …

AlgoSec Firewall Analyzer helps with HIPAA compliance

AlgoSec announced that three additional major US Healthcare organization have recently installed the industry leading AlgoSec Firewall Analyzer (AFA) to meet Health Insurance …

Imperva Extends Operations into Europe

Imperva announced the appointment of Jonathan Mepsted, formerly with Fortinet and NetScreen, as managing director for Europe, the Middle East, and Africa (EMEA). Mepsted will …

CyberGuard 1.0 information protection tools at your fingertips

CyberGuard arms you with a powerful arsenal of tools that let you encrypt files using asymmetric encryption, erase your internet and computer usage tracks, shred files with …

Access Smart’s Power LogOn passes rigorous hacker proof test program

Access Smart announced today that Elite Development Group (EDG), a leading Orange County security solutions provider, has given Access Smart’s Power LogOn password …

Botox And IT Security – Is It Too Late For You?

As a fifty something male, personal grooming takes on whole new meaning. You realize that when you start typing “Botox” on Google that things are getting serious. …

Positive Networks launches PositivePRO Version 3.5

Positive Networks introduced PositivePRO 3.5, the newest version of the company’s award-winning secure remote access service.  Its users receive regular updates as …

Official (ISC)2 guide to the CISSP CBK now available

The International Information Systems Security Certification Consortium, Inc. [(ISC)2] announced the publication of the Official (ISC)2 Guide to the CISSP CBK a comprehensive …

Full suite of solutions to meet web application security needs for any size company

Cenzic introduced two new products to protect small enterprises from vicious hackers. Hailstorm Starter and Hailstorm Core are based on Cenzic’s award-winning Hailstorm …

New Bagle worm causes incidents among users

PandaLabs has detected the appearance of Bagle.KT, a new variant of this infamous family of worms. According to data from PandaLabs, this malicious code has already caused a …

PCI Data Security Standard Calls for Next-Generation Network Security

The widespread use of credit cards for virtually all of our financial transactions has increased exponentially with the rapid adoption of e-commerce throughout the worldwide …

UCLA statement on the latest security breach

A sophisticated computer hacker has illegally and fraudulently accessed a restricted UCLA database containing names and certain personal information. This database includes …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools