Please turn on your JavaScript for this page to function normally.
IBM DB2 gets database encryption capabilities

Vormetric partnered with IBM to deliver database encryption capabilities for DB2 on Windows, Linux and Unix. IBM will offer Vormetric’s highly acclaimed data security …

Secure printing of sensitive documents with new HP appliance

HP introduced an automated, comprehensive solution that enables the secure printing of sensitive documents in corporate and government networks. HP Secure Print Advantage is …

New e-mail malware firewall for SMTP Edge Server

Clearswift introduced the new MIMEsweeper for SMTP Edge Server, an email firewall that protects business critical infrastructures from spam, viruses and malware. This new …

Updated anti-virus solution for Microsoft Windows servers

Kaspersky Lab announced the release of Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition. The product provides protection against malicious programs for servers …

(ISC)2 members take advantage of free security education

Response from (ISC)2 members to the free live and online events, part of the (ISC)2 Security Leadership Series, has been overwhelmingly positive, with all the fall one-day …

A closer look at Password Manager XP

Password Manager XP is a program specially created to help people systematize and store securely valuable information. It rids computer users of headaches caused by lost …

Ubuntu 7.10 released today, security gets a boost

Version 7.10 of the Ubuntu Server, Desktop, Kubuntu and Edubuntu Editions is available for download. The Ubuntu platform is fully certified and supported, making it a secure …

Biometrics in the latest LG-Nortel IP Phone

AuthenTec fingerprint sensors are being integrated into LG-Nortel IP phone 8540 – an innovative new phone which utilizes Microsoft’s Unified Communications …

Sourcefire expands training curriculum

Open source innovator and Snort creator announced its fall and winter 2007 Education Program, providing attendees with advanced methods for protecting critical assets through …

IM and greynet use double the cost of security

FaceTime Communications collected data in a survey of more than 700 employees and IT managers to determine the impact greynet applications have on companies and organizations. …

XSS attack across SIP protocol leaves door open for malware attacks

There is a potential new method to gain control of a user’s PC utilizing an XSS attack via the VoIP protocol called SIP. This XSS attack would allow malicious hackers to …

Global economic engine vulnerable to cyber crime

Webroot unveiled its latest report – “State of Internet Security: Protecting Small and Medium Businesses” which highlights startling survey results …

Don't miss

Cybersecurity news