Mobile surveillance platform for facilities security and law enforcement
Phoenix Worldwide Industries introduced a rapidly deployable, intelligent surveillance platform targeted toward municipalities, law enforcement and certified security …
10 Gig threat management system protects critical IP services
Arbor Networks announced a 10 Gig DDoS detection and mitigation system that enables application-layer attack protection. The Threat Management System 3100 (TMS) delivers deep …
New ForeScout CounterACT features PCI compliance kit
The payment card industry established the PCI DSS for the protection of cardholder information in response to widely publicized security breaches. Enforced through compulsory …
Third Brigade acquires open source host intrusion detection project
Third Brigade has acquired OSSEC, an open source, host-based intrusion detection system. The OSSEC project produces a multi-platform, scalable, host-based intrusion detection …
Network security change workflow solution
AlgoSec launched FireFlow, an-end-to-end policy change workflow solution which automates what is often a disjointed and manual process to ensure that changes to network …
Mismatch between IT security challenges and deployed solutions
The “CDW User-Proof IT Security Report,” a survey of business IT professionals, reveals a disparity between the most common IT security headaches and …
Sophos assists computer crime unit in a botnet master case
Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley. The hacker, of Panama City, Florida, who went by the alias …
Virtual worlds face malware reality check
Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …
Explaining non-delivery report type of spam
Research shows that up to 90% of emails received by companies are spam, and spammers have adopted a variety of methods to bypass spam filters used in anti-spam software. In …
When it comes to data security breaches, the general public doesn’t need to know
When it comes to data security breaches, 78 percent of US IT decision-makers feel that companies do not need to inform the general public; this according to a recent survey by …
Best of Open Source Security Conference announced
Sourcefire announced the launch of the Best of Open Source Security (BOSS) Conference. Scheduled to run concurrently with Sourcefire’s annual customer summit, the BOSS …
Cross platform data security for Windows Vista, XP & Mac OS X
GT Security launched SecuriKey v3.0, providing full support for Windows Vista, Windows XP, Mac OS X Leopard and Mac OS X Tiger. Designed to keep mobile data safe, SecuriKey …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics