Please turn on your JavaScript for this page to function normally.
AuthenTec combines fingerprint security with Symantec VIP

AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …

Next Level Security Systems releases mobile apps

Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …

Facebook users targeted with account-hijacking Chrome extensions

With the steady rise in popularity of both Facebook and Google’s Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert …

Open source audit plug-in for MySQL

McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …

Securing SharePoint

Microsoft SharePoint enables information sharing and report publishing. It also provides a search facility for users to find content. The problem is that, all too easily, any …

LockPath and Qualys partner on risk intelligence

LockPath, a provider of GRC applications, and Qualys, a provider of cloud information security and compliance management solutions, announced an integration partnership to …

Protect data and automate log management

Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …

Intel partners with StorageCraft for backup

StorageCraft Intel and StorageCraft have partnered to offer a Backup & Recovery (BDR) appliance, operating on the Intel Hybrid Cloud platform. The appliance protects an …

Unified web security solution from Blue Coat

Blue Coat Systems introduced its Unified Security solution that enables the extended enterprise to expand its secure perimeter to now include all users on devices across any …

Wi-Fi hotspot testing simplified

Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …

SSH user key management solution

SSH Communications Security unveiled today the first new extension of its SSH Information Integrity Platform, SSH User Key Management. The module will serve to provide …

Turn iOS devices into secure wireless flash drives

AirDisk Pro turns any iOS device into a personal and secure wireless drive, allowing users to save, manage, edit and view files on iPhone, iPad and iPod Touch devices. …

Don't miss

Cybersecurity news