Huntsman 5 defends against unknown threats
Tier-3 has launched Huntsman 5 which provides complete enterprise wide threat management, real time compliance and operational risk management capabilities. …
PDF security book: “Building or Buying VPNs”
Short Cuts are short, concise, PDF documents designed specifically for busy technical professionals. Pearson just released the following title: Building or Buying VPNS …
Georgia Southern computer security expert authors new reference book “Computer Forensics”
Computer security expert Robert Newman says the average person has no idea how much information is available about him or her in cyberspace or how to prevent that information …
Secure input, management, analysis and sharing of critical information with Memex Series VI
Memex announced the availability of Memex Series VI, a full suite of software tools that enables the secure input, management, development, analysis and sharing of …
Another vendor joins Open Web Application Security Project
Cenzic announced that the company has joined the Open Web Application Security Project (OWASP), a not-for-profit foundation, as a Vendor Organization member and will sponsor …
AlgoSec raises firewall security risk management bar
AlgoSec announced its latest version which provides a web-user interface to ensure policy compliance and maximize network efficiency. AlgoSec Firewall Analyzer solutions …
Shoulder Surfing proves too much of a temptation
New research released today depicts Britain as a nation of shoulder surfers, who can’t resist having a good look at a complete stranger’s book, laptop, newspaper …
O’Reilly Releases Windows Vista: The Definitive Guide
William Stanek’s new book “Windows Vista: The Definitive Guide” can save you time configuring Vista on work and home PCs. The Windows expert and author of 63 …
MIT Kerberos 5 Release 1.5.3 with security fixes
The MIT Kerberos Team announces the availability of MIT Kerberos 5 Release 1.5.3. This is primarily a security update release. Fixed issues include: * Fix MITKRB5-SA-2007-001: …
General availability of SSH Tectia Server 5.4 for IBM z/OS
SSH Communications Security y announced that SSH Tectia Server 5.4 for IBM z/OS is generally available with new usability features and increased integration into the IBM …
Decru secureView management framework for enterprise-wide storage security unveiled
Decru announced their SecureView management framework to enable centralized management of encryption, keys, and policies across the enterprise. The SecureView framework is …
Nationwide foils phishers with help from MarkMonitor
MarkMonitor has successfully deployed Antiphishing Solutions from MarkMonitor to automatically identify and shut down phishing scams. After just three months of use, …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege