Howard A. Schmidt named (ISC)2 Security Strategist
(ISC)2 announced that information security industry veteran Prof. Howard A. Schmidt, CISSP, has been named (ISC)2 Security Strategist by the board of directors, a role that …
Red Hat Certificate System source code released
Red Hat has just released all of the source code to Red Hat Certificate System. Much of the technology in Red Hat Certificate System was already open source, including the …
Man admits to writing anime trojan horse
Masato Nakatsuji, the 24-year-old who in January became the first ever virus writer to be arrested in Japan, admitted in Kyoto District Court that he created a Trojan horse …
New Firewall Analyzer product suite
AlgoSec announced the availability of the AlgoSec Firewall Analyzer (AFA) product suite. The new suite, which improves the overall security and efficiency of enterprise …
New product: Sophos Endpoint Security and Control 8.0
Sophos announced Sophos Endpoint Security and Control 8.0, incorporating Network Access Control technology to go beyond reactive and proactive anti-virus – offering …
New version of BullGuard Backup
BullGuard released BullGuard Backup 8.0, the second version of its stand-alone backup offering. New features include improved encryption and compression options, a larger …
Identikey Server 3.0 – new authentication solution for large enterprises
VASCO Data Security International announced today that it launches its new authentication server, Identikey Server 3.0. This authentication solution, based on VACMAN’s …
Four key steps every company should take to protect its critical data
Ecora Software outlined a series of safeguards that companies should consider implementing in order to be protected from harm caused by unauthorized access to critical data. …
New versions of Veritas Storage Foundation and Cluster Server 5.1
Symantec announced Veritas Storage Foundation and Veritas Cluster Server 5.1 for Windows, the industry leading heterogeneous storage management and high availability solution …
Spammers are leveraging Google applications
BitDefender antispam analysts have detected that Nigerian scam spammers are using a new gateway to target the corporate world: Google Calendar. Nigerian scam spammers are …
SSL VPN technology is enhancing virtual services
Secure Socket Layer (SSL) virtual private networks (VPN) solutions have matured past some of their initial shortcomings, but face consistent restraints such as budget …
Secure Mail next gen email security appliance
Secure Computing announced a new version of its on-premise email security solution, Secure Mail (formerly known as IronMail). This new version is capable of processing more …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics