McAfee recently at its FOCUS 2008 Security Conference announced that it is teaming with HP ProCurve, Intel, and VMware. The …
Secure Computing’s Cyber Security Initiative Complying with CIP
Secure Computing recently unveiled its Cyber Security Initiative, which aims to increase awareness on the importance of complying with Critical …
SonicWALL Launches Email Security 7.0
SonicWALL launches the latest version of its Email Security solution designed to help companies protect themselves from spam, viruses, phishing …
Combating Threats
Although the region has emerged as one of the fastest growing segment in world, but bandwidth is still an issue …
Plugging the leak
Some statistics first – • Only 38% of organizations believe that they are adequately or very adequately protected against data …
Cyberoam announces latest email threat trend report
Cyberoam announces the Q3 2008 email threat trend report, prepared in collaboration with partner Commtouch. The report reveals spammers techniques …
Intrusion-prevention systems still not used full throttle: survey
Infonetics Research interviewed 169 security professionals responsible for managing IPS in their organizations to find out whether the full functionality …
Mirror, mirror on the wall, how safe are we?
There is a fundamental tenet in business: “If the rate of change outside an organisation is greater than the rate …
Extreme Networks, HP boost VoIP security
Extreme Networks plans to unveil a software upgrade to its security appliances designed to better safeguard VoIP traffic. Separately, HP …
Going virtual
Are Multi-protocol Label Switching (MPLS) VPNs the way to go? For many corporate network needs the answer is yes, absolutely, …
Wireless worries
Why is it that security is still such a big worry for IT managers when it comes to deploying wireless …
Fighting threats on every front
The threats to a corporation's security are changing so quickly that it is difficult to determine what steps are required …
Five steps to safer virtual servers
1. Protect your host operating system by using server hardening tools and methodologies. Additional OS features such as isolation capabilities …
Wireless networks: The burning questions
How will 802.11n high-throughput wireless LANs affect the corporate net? A surprising number of wireless LAN vendors have recently announced …
Conficker hype may have harmed security efforts, FBI cyber chief says
Media hype leading up to the Conficker worm's April 1 update may have distracted computer users from other dangerous security …
Internet Explorer 8: Security Features for Enterprise Users
Over the past year, Internet Explorer has lost market share while browsers such as Mozilla's Firefox, Apple's Safari and even …