Please turn on your JavaScript for this page to function normally.
Global State of Information Security Survey 2008 findings

Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …

Q3 2008 Email Threats Trend Report highlights

 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …

Organized cybercrime replaces random individual attacks

Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …

Data privacy application from SAP and Cisco

SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …

New SSL VPN gateway – Connectra NGX R66

Check Point announced Connectra NGX R66, its access gateway that combines SSL VPN, IPSec VPN and intrusion prevention with centralized management. The new release of Connectra …

Updated CompTIA Security+ Exam available October 14

The Computing Technology Industry Association (CompTIA), the leading provider of vendor-neutral certifications for the world’s technology workforce, announced today the …

New book: “iPhone UK: The Missing Manual”

iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …

Check Point’s DynamicID simplifies two-factor authentication

Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …

Secure Computing supplies SCADA-specific security signatures

Secure Computing is incorporating three new signature file types for SCADA-specific protocols into its Secure Firewall. SCADA (Supervisory Control and Data Acquisition) …

The insider security threat in IT and financial services

RSA announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in 2008. The survey polled 417 …

Enterprise security solution for Linux on IBM System z

SSH Communications Security introduced SSH Tectia Server for Linux on IBM System z. This new version provides a unified, end-to-end security model that extends from …

First miniature security computer for Mac desktops and laptops

The new Gatekeeper Pico for Mac and Gatekeeper Card Pro for Mac, provide 12 internet security applications on a dedicated hardware that offloads security, improves …

Don't miss

Cybersecurity news