Biometric authentication service for web and mobile service providers
BioID announced BioID Connect, a cloud-based biometric authentication service that providers of web, cloud and mobile services can easily integrate to offer their users …
nCircle releases Configuration Compliance Manager 5.13
nCircle announced its Configuration Compliance Manager 5.13. This release adds the ability to audit MySQL and Microsoft Windows Server Internet Information Services (IIS) 7 …
Qualys expands QualysGuard PCI cloud platform
Qualys has expanded QualysGuard PCI to assist organizations of all sizes to meet Payment Card Industry (PCI) Data Security Standards (DSS), including new internal scanning …
Record privileged sessions in Password Manager Pro
ManageEngine announced the immediate session recording capabilities in its privileged password management software, Password Manager Pro. Now, privileged sessions launched …
Whonix: Anonymous operating system
Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …
Security industry needs a healthy job market
The information security industry is facing an inflationary spiral, which is both unsustainable and bad for the economy as the skills gap in information security continues to …
5 tips for effective disaster recovery
David Mount, technical director at NetIQ, has highlighted 5 tips that will help businesses implement effective disaster recovery plans for their all important IT assets. Am I …
One-click security within Microsoft Outlook
CertiVox launched an automatic, end-to-end encryption capability designed specifically to enable government, businesses and individuals to benefit from one-click security …
RSA helps thwart smash-and-grab credential theft
At RSA Conference Europe 2012 in London, RSA introduced a new technology designed to protect passwords and other credentials and secrets stored in databases from cyber …
Constant connectivity to social networks goes hand-in-hand with malware
In September, GFI threat researchers documented a number of cybercrime campaigns directed at users of various social networking sites including direct message spam on Twitter …
Free mobile app profiler for risk assessment
At RSA Conference Europe 2012, Zscaler announced the results of an analysis from ThreatLabZ which reveals that up to 10 percent of mobile apps expose user passwords and login …
HyTrust prevents virtual data center and audit failures
HyTrust released HyTrust Appliancev3.0 which includes a Secondary Approval feature that is designed to prevent risk, whether caused by unintended or malicious actions, to VMs, …
Featured news
Resources
Don't miss
- AI agents can leak company data through simple web searches
- Early reporting helps credit unions stop fraudulent transfers faster
- Product showcase: Syteca – The human-centric insider threat management platform
- Scammers target international students by threatening their visa status
- Proximity: Open-source MCP security scanner