Please turn on your JavaScript for this page to function normally.
Duo Security launches secure mobile ID

Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …

Modeling, customizing, and automating applications with AWS OpsWorks

Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …

Antibot: Network-based botnet removal tool

Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …

BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities

BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …

SmartShare: Free tool for secure social sharing

Veracode released SmartShare, a free tool designed to offer developers, bloggers and marketers a more secure method of on-site bookmark sharing. With more online content being …

CA streamlines identity and access management

CA announced its CA CloudMinder identity and access management (IAM) service solution. CA CloudMinder provides enterprise-grade IAM for both cloud-based or on-premise …

Zscaler delivers big visibility security analytics

Zscaler unveiled new analytics technology that gives enterprise security professionals real-time visibility into all employee internet activity across web, cloud email, and …

McAfee delivers unified rapid-response security management

McAfee is raising the bar on intelligent threat identification, time to respond and robust, unified security management with the latest updates to its security management …

Opportunistic scanning from cloud to endpoint

iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …

Unintended, malicious and evil applications of augmented reality

Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …

Privacy and security incident management for healthcare

A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …

F-Secure Client Security updated with threat detection technology

As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …

Don't miss

Cybersecurity news