Protection suite for Linux multi-site cluster
New SteelEye Protection Suite for Linux Multi-Site Cluster is aimed towards Linux users looking to cost-effectively extend existing high-availability capabilities as well as …
Spammers cloak their reputation
A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …
New book: “Nagios: System and Network Monitoring, 2nd Edition”
The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …
NVIDIA Tesla supercomputers used for password recovery
ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …
Global State of Information Security Survey 2008 findings
Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …
Q3 2008 Email Threats Trend Report highlights
 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …
Organized cybercrime replaces random individual attacks
Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …
Data privacy application from SAP and Cisco
SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …
New SSL VPN gateway – Connectra NGX R66
Check Point announced Connectra NGX R66, its access gateway that combines SSL VPN, IPSec VPN and intrusion prevention with centralized management. The new release of Connectra …
Updated CompTIA Security+ Exam available October 14
The Computing Technology Industry Association (CompTIA), the leading provider of vendor-neutral certifications for the world’s technology workforce, announced today the …
New book: “iPhone UK: The Missing Manual”
iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …
Check Point’s DynamicID simplifies two-factor authentication
Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics