software
Active response to database threats
AppSecInc announced DbProtect Active Response. Designed to provide an added layer of security around valuable and sensitive data, it gives organizations the flexibility to …
Data security for businesses that don’t need a full security suite
Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …
F-Secure launches Internet Security 2012
F-Secure launched Internet Security 2012, an improved version of its online safety offering. It is easy to use and the new Launch pad provides convenient access to all parts …
MagicTree: Data management for penetration testers
Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host …
Cloud-based anti-phishing software platform
FraudSense announced a public demo featuring its proprietary real-time anti-phishing detection algorithms. FraudSense identifies and disables fraudulent websites in real-time. …
GFI VIPRE Antivirus Business 5.0 released
GFI Software launched GFI VIPRE Antivirus Business 5.0 and GFI VIPRE Business Premium 5.0, the latest evolutions of the company’s flagship antivirus solutions. GFI has …
Check Point stops bot attacks
Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …
Stonesoft a2Cloud: Strong authentication for secure cloud access
Stonesoft announced its new a2Cloud solution which offers secure access to the cloud with usability, minimal administration and low total cost of ownership. a2Cloud delivers …
Data security for Microsoft SharePoint
Imperva announced SecureSphere for SharePoint, a data security solution to help businesses protect sensitive data stored in Microsoft SharePoint. The product addresses the …
Patching strategies
Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …
Anti-theft protection for Android and Windows devices
Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …
Critical vulnerabilities in Adobe Photoshop Elements 8
Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …
Featured news
Resources
Don't miss
- Balancing proprietary and open-source tools in cyber threat research
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management