software
Kaspersky PURE 2.0 Total Security released
Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection – …
AuthenTec combines fingerprint security with Symantec VIP
AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …
Next Level Security Systems releases mobile apps
Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …
Facebook users targeted with account-hijacking Chrome extensions
With the steady rise in popularity of both Facebook and Google’s Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert …
Open source audit plug-in for MySQL
McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …
Securing SharePoint
Microsoft SharePoint enables information sharing and report publishing. It also provides a search facility for users to find content. The problem is that, all too easily, any …
LockPath and Qualys partner on risk intelligence
LockPath, a provider of GRC applications, and Qualys, a provider of cloud information security and compliance management solutions, announced an integration partnership to …
Protect data and automate log management
Released today, WhatsUp Log Management 10.1.1 boasts pre-built, out-of-the-box reports, focused on complying with European-specific data protection regulations. The reports …
Intel partners with StorageCraft for backup
StorageCraft Intel and StorageCraft have partnered to offer a Backup & Recovery (BDR) appliance, operating on the Intel Hybrid Cloud platform. The appliance protects an …
Unified web security solution from Blue Coat
Blue Coat Systems introduced its Unified Security solution that enables the extended enterprise to expand its secure perimeter to now include all users on devices across any …
Wi-Fi hotspot testing simplified
Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …
SSH user key management solution
SSH Communications Security unveiled today the first new extension of its SSH Information Integrity Platform, SSH User Key Management. The module will serve to provide …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security