Fighting computer crimes without the threat of a forensic compromise
It seems that no matter what illegal activity is pursued, whether it is pornography, kidnapping, murder, or even terrorism, the so-called criminal masterminds leave a winding …
Apache Tomcat 4.1.39 fixes security issues
Apache Tomcat is an implementation of the Java Server Pages 1.2 and Java Servlet 2.3 specifications. Apache Tomcat powers numerous large-scale, mission-critical web …
BIO-key granted patent to secure biometric enrollments from unauthorized use
BIO-key announced that the U.S. Patent and Trademark Office has approved the issuance of a patent for the company’s “Match Template Protection within a Biometric …
Solarflare 65nm triple-speed 10GBASE-T silicon
Solarflare Communications announced its second-generation 10GBASE-T PHY product to switch and server customers, including original design manufacturers (ODMs). The 10Xpress …
Growth in Internet crime calls for growth in punishment
In its “End of Year Data Security Wrap-up” for 2008, F-Secure explains how 2008 has been another record year of explosive growth in the amount of malicious …
SecureEmail free for non-commercial use
Prudent personal computer users do not entrust their private information to non-encrypted email. It is easy for a mildly-talented hacker to intercept email messages. If email …
Prevent illegal corporate activity with SifoScopes
O2 Security launched its SifoScopes network behavior recorder appliance. The product is designed to prevent illegal corporate computer activity and improve workforce …
Automated network compliance and assurance management for PCI DSS
Skybox Security announced Skybox Assure version 4.1 composed of two products: Firewall Compliance Auditor and Network Compliance Auditor. The new release enables enterprises …
Survey unveils major gap in the way CEOs manage cyber risks
A recent Carnegie Mellon University CyLab survey of corporate board directors reveals a gap in board and senior executive oversight in managing cyber risks. Based upon data …
First HDTV network camera with 10x optical zoom and H.264 compression
Axis Communications announced that it is introducing a network camera with true HDTV performance in compliance with the SMPTE standard in resolution, color representation and …
Utimaco combines the Lenovo fingerprint logon with full disk encryption
The Data Security Company released SafeGuard Enterprise 5.35, the first solution on the market that combines the Lenovo fingerprint logon with full disk encryption to ensure …
Vulnerability management solution from Rapid7 and Trend Micro
Rapid7 and Trend Micro announced that Rapid7 NeXpose is the vulnerability management engine inside Trend Micro SecureSite, a new hosted, Web-threat vulnerability scanning …