encryption
Multi-cloud security groups
Dome9 Security added a new capability called Dome9 Security Groups – group-based firewall policy management – to its leading cloud security management service. …
Entrust Discovery now offers Microsoft CAPI query capabilities
Entrust expands its certificate discovery solution, Entrust Discovery, by broadening search capabilities for digital certificates residing within Microsoft’s …
Samsung introduces suite of security features for Android
The Samsung Galaxy Note and Galaxy Tab 7.7 will be the first Samsung Approved for Enterprise (SAFE) devices provided to consumers who wish to use their own mobile devices in …
IPAM and DNSSEC key management integration
The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common …
Beware of password-protected documents carrying malware
Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …
GlobalSign reports CA infrastructure wasn’t compromised
When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …
Security-hardened key management
Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations …
Top 5 authentication predictions for 2012
Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …
Yahoo! Mail now with second sign-in verification
More than a year after Google rolled out 2-factor authentication for its Gmail service, Yahoo! is finally beginning to add the option for its users. Owners of a Yahoo! Account …
Mobile VPN client for Android
Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …
Pros losing confidence in hard tokens
Almost a quarter of organizations, 23%, have suffered a security breach as a result of identity fraud which was linked to a lost or stolen authentication device, according to …
IT departments have easiest access to sensitive data
CEOs of modern companies often lack access to their own sensitive data, according to Venafi. When asked who had the easiest access to their company’s most sensitive …
Featured news
Resources
Don't miss
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework
- Your smart home may not be as secure as you think
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program