Please turn on your JavaScript for this page to function normally.
Huntsman 5 defends against unknown threats

Tier-3 has launched Huntsman 5 which provides complete enterprise wide threat management, real time compliance and operational risk management capabilities.  …

PDF security book: “Building or Buying VPNs”

Short Cuts are short, concise, PDF documents designed specifically for busy technical professionals. Pearson just released the following title: Building or Buying VPNS …

Georgia Southern computer security expert authors new reference book “Computer Forensics”

Computer security expert Robert Newman says the average person has no idea how much information is available about him or her in cyberspace or how to prevent that information …

Secure input, management, analysis and sharing of critical information with Memex Series VI

Memex announced the availability of Memex Series VI, a full suite of software tools that enables the secure input, management, development, analysis and sharing of …

Another vendor joins Open Web Application Security Project

Cenzic announced that the company has joined the Open Web Application Security Project (OWASP), a not-for-profit foundation, as a Vendor Organization member and will sponsor …

AlgoSec raises firewall security risk management bar

AlgoSec announced its latest version which provides a web-user interface to ensure policy compliance and maximize network efficiency. AlgoSec Firewall Analyzer solutions …

Shoulder Surfing proves too much of a temptation

New research released today depicts Britain as a nation of shoulder surfers, who can’t resist having a good look at a complete stranger’s book, laptop, newspaper …

O’Reilly Releases Windows Vista: The Definitive Guide

William Stanek’s new book “Windows Vista: The Definitive Guide” can save you time configuring Vista on work and home PCs. The Windows expert and author of 63 …

MIT Kerberos 5 Release 1.5.3 with security fixes

The MIT Kerberos Team announces the availability of MIT Kerberos 5 Release 1.5.3. This is primarily a security update release. Fixed issues include: * Fix MITKRB5-SA-2007-001: …

General availability of SSH Tectia Server 5.4 for IBM z/OS

SSH Communications Security y announced that SSH Tectia Server 5.4 for IBM z/OS is generally available with new usability features and increased integration into the IBM …

Decru secureView management framework for enterprise-wide storage security unveiled

Decru announced their SecureView management framework to enable centralized management of encryption, keys, and policies across the enterprise. The SecureView framework is …

Nationwide foils phishers with help from MarkMonitor

MarkMonitor has successfully deployed Antiphishing Solutions from MarkMonitor to automatically identify and shut down phishing scams. After just three months of use, …

Don't miss

Cybersecurity news