Please turn on your JavaScript for this page to function normally.
Sober Comeback Poses As Long Lost School Friend

Experts at SophosLabs, Sophos’s global network of virus, spyware and spam analysis centres, are warning users about two new spyware email worms, which pose as an old …

Check Point to Acquire Makers of Snort

Check Point Software Technologies Ltd. and Sourcefire, Inc., developers of Snort, today announced that they have signed a definitive agreement for Check Point to acquire …

Check Point Software Technologies to Acquire Sourcefire

REDWOOD CITY, Calif. and COLUMBIA, Md. – October 6, 2005 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, …

Senforce Survey Finds Companies Don’t Secure Data “On the Move”

Draper, Utah – October 5, 2005 – Senforce Technologiesâ„? Inc., the leader in location-aware endpoint and wireless security enforcement, today announced the …

Array Networks’ SPX3000 Mid-Range SSL VPN Solution Captures an IT Week Magazine’s Editor’s Choice Award

MILPITAS, CA , October 5, 2005 — Array Networks, a leader in secure, accelerated IP access solutions , today announced that IT Week Magazine has awarded the SPX3000 SSL …

Increased Need to Protect Online Business Applications Set to Fuel Growth of Untapped Web Application Firewall Market

London, UK 05th October, 2005 – With networks relatively well protected with a myriad of security technologies, hackers and other malicious third parties are directing …

PrivacyAnywhere Software releases PestBlock 2.5

PrivacyAnywhere Software today announces the immediate availability of PestBlock 2.5, a powerful anti-spyware tool for the Windows OS. Optimized for high-speed performance, …

Common Malware Enumeration Initiative

US non-profit IT company MITRE today announced the Common Malware Enumeration Initiative. Headed by the United States Computer Emergency Readiness Team (US-CERT) and supported …

Details From the Anti-Phishing Act of 2005

California is the first US state to pass anti phishing laws. Finally someone went a step further in, at least, trying to create a more secure cyberspace. Here are some of the …

Koolspan Two-Factor Authentication Solution To Deploy At Mavenspire Secure Data Center

Bethesda, Md., Oct. 4, 2005—KoolSpan, Inc., the leading provider of plug-and-play security solutions that bridge networks, users, and devices, today announced its flagship …

Security policies must evolve to reflect growing IP mobility

4 October, 2005. Company data is being put at risk by IT managers not updating their security policies to reflect evolving Internet Protocol (IP) mobility, according to …

Leading Analyst Firm Report Identifies Trend Micro as Fastest Growing Vendor Among Top Three Secure Content Management Providers

Cupertino, CA -October 4, 2005 – Trend Micro, Inc. (TSE: 4704, NASDAQ: TMIC), a leader in network antivirus and Internet content security software and services, today …

Don't miss

Cybersecurity news