Image-sensing technology for tracking individuals
Fujitsu announced the development of a new image-sensing technology that can thoroughly and accurately track – without blind spots – the motion paths of multiple …
New book: “Programming Amazon Web Services”
The web is full of opportunities for companies both large and small, but smaller companies face a difficult problem: infrastructure. Industrial-strength infrastructure can be …
K-12 schools’ cyber safety declines
CDW Government (CDW-G) announced the results of the 2008 School Safety Index, the national benchmark on the current status of public school district safety. Based on eight …
Home security, monitoring and automation platform
uControl announced a software platform that allows service providers to deploy cutting edge Home Security, Monitoring and Automation (SMA) services. The uControl SMA Platform …
Changes to the Nessus Vulnerability Scanner subscription model
Tenable’s CEO Ron Gula and Nessus creator Renaud Deraison posted a letter to the Nessus community announcing some changes in the subscription model. Since creating and …
Japanese P2P virus writer convicted, but escapes jail
24-year-old Masato Nakatsuji, who was the first ever virus writer to be arrested in Japan when he was apprehended in January, admitted writing the malware which displayed …
New book: “The Book of IMAP”
The Internet Message Access Protocol (IMAP) allows clients to access their email on a remote server, whether from the office, a mobile phone, or a hotel room in Outer …
IT spending concerns mounting
An Astaro survey of over 350 attendees of the Interop Las Vegas conference indicates that a 2008 recession will effect IT spending for 52 percent of participants. This is an …
E-mail mismanagement puts organizations at risk
E-mail is arguably the single largest source of information creation for most organizations. Yet for the majority, email is poorly managed – if at all. According to …
Majority of U.S. consumers are likely to enroll in voice verification
According to a study conducted by Harris Interactive for Nuance Communications, consumers are embracing the use of voice verification in protecting important personal …
Mobile signatures and identity services are a success
Mobile signatures transform any mobile phone into an identity card and signature pen for online and mobile services. A user-chosen numerical password, or signing PIN, tells …
Common Criteria evaluation of AppGate Security Server 8.0.4
AppGate Network Security has achieved Common Criteria certification of the AppGate Security Server under the German BSI scheme. The Common Criteria is an internationally …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool