NVIDIA Tesla supercomputers used for password recovery
ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …
Global State of Information Security Survey 2008 findings
Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …
Q3 2008 Email Threats Trend Report highlights
 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …
Organized cybercrime replaces random individual attacks
Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …
Data privacy application from SAP and Cisco
SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …
New SSL VPN gateway – Connectra NGX R66
Check Point announced Connectra NGX R66, its access gateway that combines SSL VPN, IPSec VPN and intrusion prevention with centralized management. The new release of Connectra …
Updated CompTIA Security+ Exam available October 14
The Computing Technology Industry Association (CompTIA), the leading provider of vendor-neutral certifications for the world’s technology workforce, announced today the …
New book: “iPhone UK: The Missing Manual”
iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …
Check Point’s DynamicID simplifies two-factor authentication
Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …
Secure Computing supplies SCADA-specific security signatures
Secure Computing is incorporating three new signature file types for SCADA-specific protocols into its Secure Firewall. SCADA (Supervisory Control and Data Acquisition) …
The insider security threat in IT and financial services
RSA announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in 2008. The survey polled 417 …
Enterprise security solution for Linux on IBM System z
SSH Communications Security introduced SSH Tectia Server for Linux on IBM System z. This new version provides a unified, end-to-end security model that extends from …