Please turn on your JavaScript for this page to function normally.
Protect data by finding forgotten databases

Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …

Web filtering technology with next-generation firewall capabilities

Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …

Open source password manager gets two-factor authentication

Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers …

Citrix releases open source cloud platform

Today Citrix announced the availability of Citrix CloudStack 3, the first release of the open source cloud platform under the Citrix brand. CloudStack is already the …

Kaspersky Lab unveils virtualization security solution

Kaspersky Lab announced Kaspersky Security for Virtualization, focused on protecting evolving corporate IT infrastructures from malware and cybercriminals. The solution …

Apple iWork passwords cracked

ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …

Web app security scanner Netsparker 2.1 released

Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …

Faronics Anti-Virus 3.0 released

Faronics Anti-Virus 3.0 includes Process Protection to defend against attacks at the application level, as well as an IDS that has the ability to write rules for zero day …

Satellite telephony encryption cracked

Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst G?¶rtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have …

Security architecture for trusted execution environments

Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …

Improved data recovery from SSDs

Data recovery from new types of data storage can be extremely time-consuming because of the need to research the algorithms used to originally store the data. Previously, …

Security for IT consumerization

Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …

Don't miss

Cybersecurity news