Please turn on your JavaScript for this page to function normally.
U.S. college students want technology skills to compete for jobs

Amid concerns that the economic downturn could impact their career plans, eight in 10 U.S. college students see a growing need for more IT professionals as technology …

Protect enterprise data with default-deny protection

Rather than permit executable computer files to install themselves unless they appear on a blacklist, Comodo’s Endpoint Security Manager protects enterprise data on a …

Open networking solution now with SSL-based OpenVPN and IPS

Routing and security software Vyatta Community Edition reached version 5. VC5 greatly expands Vyatta’s security feature set, adding SSL-based OpenVPN, intrusion …

Opera Turbo now available for testing

Opera Turbo is a server-side optimization and compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections by …

Army database compromised

The Army recently discovered a potential penetration of soldier information that occurred on a password-protected, secure web-based database of almost 1600 soldiers. As a …

New book: “The Art of Application Performance Testing”

Businesses in today’s world live and die by the performance of mission-critical software applications Sadly, many applications are deployed without being adequately …

Call for papers: International Conference on Digital Forensics and Cyber Crime

The International Conference on Digital Forensics and Cyber Crime is now accepting papers. Authors are invited to submit original and unpublished papers, accepted papers will …

60th felony conviction obtained in software piracy crackdown “Operation Fastlink”

The 60th felony conviction from Operation Fastlink, a major Department of Justice initiative to combat online piracy worldwide. Bryan Thomas Black, 30, pleaded guilty to one …

D-Link unveils compact 5-bay network storage solution

D-Link is now shipping the 5-bay iSCSI Storage Area Network (SAN) Array enclosure which is capable of holding up to 7.5 terabytes of data. Each bay accommodates one 3.5-inch …

Video: Snort – the forensics tool?

In the video below you can watch Dave Warren give a talk on “Snort – The Forensics Tool?”. The video was taken at this month’s DojoSec Monthly Briefings.

Endpoint security offering from IBM

IBM announced a first-of-a-kind endpoint security offering, IBM Proventia Endpoint Secure Control (ESC) which delivers endpoint security management designed to address two …

New System-on-a-Chip 1U communication appliance platform

Portwell Technology announces CATO-2000, a new System-on-a-Chip 1U communication appliance platform based on the Intel EP80579 Integrated Processor with Intel QuickAssist …

Don't miss

Cybersecurity news