Please turn on your JavaScript for this page to function normally.
New book: “Twitter API: Up and Running”

Twitter is the new frontier of the social media movement. And for every forward looking programmer ready to dive into the world of microblogging, “Twitter API: Up and …

Online backup virtual appliance on Amazon Web Services

Vembu Technologies made available for production StoreGrid Cloud AMI, an online backup virtual appliance on Amazon Web Services. With the StoreGrid Cloud AMI and the popular …

New version of remote management console for Macs

Intego announced an update to Remote Management Console, a program that allows administrators to manage and configure Intego security software on Macintosh computers across a …

F-Secure launches new version of Protection Service for Business

With the current explosion of Internet malware and online crime – including targeted attacks on businesses – online security has become an important factor in …

New high-end security gateway series from Check Point

Check Point announced a new high-end Power-1 series of appliances designed to meet the heavy demands of large enterprises and data centers. The Power-1 11000 series features …

Podcast: AirDefense on wireless security at RSA Conference 2009

Earlier today AirDefense released its findings related to wireless security at RSA Conference 2009. In this podcast, Michael Raggo from AirDefense discusses these findings in …

Photos: RSA Conference 2009 expo #4

Here’s another glance at the RSA Conference 2009 expo floor. The featured companies are: ArcSight, VeriSign, Red Condor, Google, EMC, CompTia, Oracle and Navayo. The …

Podcast: Modulo Risk Manager for the iPhone

Organizations have started doing extensive data collections worldwide. In this podcast, Alan Mattson, VP of Business Development at Modulo, discusses how their Risk Manager …

Security event monitoring, incident response, log management and compliance reporting

Jointly developed by Splunk and GlassHouse, Splunk Enterprise Security Suite (ESS) brings the power of enterprise security information and event management together with the …

AirDefense finds wireless security lacking at RSA Conference 2009

Motorola AirDefense performed wireless monitoring at the RSA conference. The monitoring was conducted from Day 1 through Day 2 of the conference (April 21-22, 2009). The …

First integrated tokenization solution for business

The nuBridges Protect Token Manager is the industry’s first data security software solution to combine universal Format Preserving Tokenization, encryption and unified …

Updated research of the largest base of real-world vulnerability data

Wolfgang Kandek, CTO of Qualys, today unveiled Laws of Vulnerabilities 2.0 derived from the industry’s largest vulnerability dataset. The Laws 2.0 reveals vulnerability …

Don't miss

Cybersecurity news