U.S. college students want technology skills to compete for jobs
Amid concerns that the economic downturn could impact their career plans, eight in 10 U.S. college students see a growing need for more IT professionals as technology …
Protect enterprise data with default-deny protection
Rather than permit executable computer files to install themselves unless they appear on a blacklist, Comodo’s Endpoint Security Manager protects enterprise data on a …
Open networking solution now with SSL-based OpenVPN and IPS
Routing and security software Vyatta Community Edition reached version 5. VC5 greatly expands Vyatta’s security feature set, adding SSL-based OpenVPN, intrusion …
Opera Turbo now available for testing
Opera Turbo is a server-side optimization and compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections by …
Army database compromised
The Army recently discovered a potential penetration of soldier information that occurred on a password-protected, secure web-based database of almost 1600 soldiers. As a …
New book: “The Art of Application Performance Testing”
Businesses in today’s world live and die by the performance of mission-critical software applications Sadly, many applications are deployed without being adequately …
Call for papers: International Conference on Digital Forensics and Cyber Crime
The International Conference on Digital Forensics and Cyber Crime is now accepting papers. Authors are invited to submit original and unpublished papers, accepted papers will …
60th felony conviction obtained in software piracy crackdown “Operation Fastlink”
The 60th felony conviction from Operation Fastlink, a major Department of Justice initiative to combat online piracy worldwide. Bryan Thomas Black, 30, pleaded guilty to one …
D-Link unveils compact 5-bay network storage solution
D-Link is now shipping the 5-bay iSCSI Storage Area Network (SAN) Array enclosure which is capable of holding up to 7.5 terabytes of data. Each bay accommodates one 3.5-inch …
Video: Snort – the forensics tool?
In the video below you can watch Dave Warren give a talk on “Snort – The Forensics Tool?”. The video was taken at this month’s DojoSec Monthly Briefings.
Endpoint security offering from IBM
IBM announced a first-of-a-kind endpoint security offering, IBM Proventia Endpoint Secure Control (ESC) which delivers endpoint security management designed to address two …
New System-on-a-Chip 1U communication appliance platform
Portwell Technology announces CATO-2000, a new System-on-a-Chip 1U communication appliance platform based on the Intel EP80579 Integrated Processor with Intel QuickAssist …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes