New hardware security module from Thales
Thales announced Thales nShield Connect 6000, a fast network-attached hardware security module and the only one to offer dual, hot-swappable power supplies. HSMs are widely …
New software filtering client for laptops
SmoothWall announced the release of Mobile Guardian – a new software filtering client, designed to prevent roaming laptop users from accessing inappropriate and …
BitDefender for HTTP proxy for Linux released for beta testing
BitDefender announced that BitDefender for HTTP Proxy for Linux is available for beta testing. It offers advanced features, including: Real-Time Scanning of Internet Traffic: …
Endpoint security from Check Point
Check Point announced Check Point Endpoint Security R72, a new version of their single agent for endpoint security. New Check Point WebCheck browser security protects …
Juniper’s adaptive threat management solutions for distributed enterprises
Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, deliver security at scale that is identity aware and application aware, …
Security code review service for threat identification
Comsec Consulting launched CODEFEND, a new application security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat …
Users voice key factors of virus protection
In an online survey conducted during May 2009, 9325 surfers told IT security specialist Avira about the criteria they use when choosing their virus protection. International …
First vascular recognition solution to earn certification
Fujitsu announced that the Fujitsu PalmSecure vascular biometric authentication technology has been certified under the International Common Criteria for Information …
85% of US organizations hit by one or more data breaches within the last 12 months
PGP Corporation announced the results from The Ponemon Institute’s fourth annual study on encryption usage in the enterprise – The 2009 Annual Study: U.S. …
Trend Micro’s protection for virtual machines
Trend Micro is expanding its virtualization security portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines …
Firewall management app turns firewalls back into network security devices
Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …
Criminals use enterprise strategies to conduct attacks
Cisco released their 2009 Midyear Security Report, which shows that Internet criminals are increasingly operating like successful businesses, borrowing some of the best …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption