GRC solution automates audit, control and risk functions
MEGA International introduced GRC Suite 3.0. This version is unique in its recognition of the overlap in audit, risk, and control activities; it offers a common platform …
Image-sensing technology for tracking individuals
Fujitsu announced the development of a new image-sensing technology that can thoroughly and accurately track – without blind spots – the motion paths of multiple …
New book: “Programming Amazon Web Services”
The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …
K-12 schools’ cyber safety declines
CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …
Home security, monitoring and automation platform
uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …
Changes to the Nessus Vulnerability Scanner subscription model
Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …
Japanese P2P virus writer convicted, but escapes jail
24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …
New book: “The Book of IMAP”
The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …
IT spending concerns mounting
An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …
E-mail mismanagement puts organizations at risk
E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …
Majority of U.S. consumers are likely to enroll in voice verification
According to a study conducted by Harris Interactive for Nuance Communications, consumers are embracing the use of voice verification in protecting important personal …
Mobile signatures and identity services are a success
Mobile signatures transform any mobile phone into an identity card and signature pen for online and mobile services. A user-chosen numerical password, or signing PIN, tells …
Featured news
Sponsored
Don't miss
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation
- Cirrus: Open-source Google Cloud forensic collection