New version of remote management console for Macs
Intego announced an update to Remote Management Console, a program that allows administrators to manage and configure Intego security software on Macintosh computers across a …
F-Secure launches new version of Protection Service for Business
With the current explosion of Internet malware and online crime – including targeted attacks on businesses – online security has become an important factor in …
New high-end security gateway series from Check Point
Check Point announced a new high-end Power-1 series of appliances designed to meet the heavy demands of large enterprises and data centers. The Power-1 11000 series features …
Podcast: AirDefense on wireless security at RSA Conference 2009
Earlier today AirDefense released its findings related to wireless security at RSA Conference 2009. In this podcast, Michael Raggo from AirDefense discusses these findings in …
Photos: RSA Conference 2009 expo #4
Here’s another glance at the RSA Conference 2009 expo floor. The featured companies are: ArcSight, VeriSign, Red Condor, Google, EMC, CompTia, Oracle and Navayo. The …
Podcast: Modulo Risk Manager for the iPhone
Organizations have started doing extensive data collections worldwide. In this podcast, Alan Mattson, VP of Business Development at Modulo, discusses how their Risk Manager …
Security event monitoring, incident response, log management and compliance reporting
Jointly developed by Splunk and GlassHouse, Splunk Enterprise Security Suite (ESS) brings the power of enterprise security information and event management together with the …
AirDefense finds wireless security lacking at RSA Conference 2009
Motorola AirDefense performed wireless monitoring at the RSA conference. The monitoring was conducted from Day 1 through Day 2 of the conference (April 21-22, 2009). The …
First integrated tokenization solution for business
The nuBridges Protect Token Manager is the industry’s first data security software solution to combine universal Format Preserving Tokenization, encryption and unified …
Updated research of the largest base of real-world vulnerability data
Wolfgang Kandek, CTO of Qualys, today unveiled Laws of Vulnerabilities 2.0 derived from the industry’s largest vulnerability dataset. The Laws 2.0 reveals vulnerability …
Microsoft outlines progress towards a safer Internet
Microsoft discussed progress toward enabling End to End Trust, the company’s vision for a safer, more trusted Internet first introduced at last year’s event. In …
RSA provides transparent authentication to enterprises
The new release of the RSA Adaptive Authentication platform is designed for large, distributed enterprise environments and helps to identify users using self-learning risk …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul