HomeCybersecurity

Cybersecurity

PostXs Trusted Enterprise 5.0

For companies that want to encrypt outbound e-mail without burdening recipients with client requirements, both PostX Corp.s PostX Trusted Enterprise and Voltage Security Inc.s...

Voltage Securitys SecureMail 1.5

For companies that want to encrypt outbound e-mail without burdening recipients with client requirements, both PostX Corp.s PostX Trusted Enterprise and Voltage Security Inc.s...

AirMagnet Enterprise 5.0

The latest version of AirMagnets Enterprise solution (formerly known as AirMagnet Distributed) marks AirMagnets first foray into location prediction and also greatly enhances the...

Disruptive Tech Gets Scary

Octobers advent of wireless weapons suggests a new and scary meaning of the phrase "disruptive technology." The month began with a worldwide wave of...

Newbury Networks WiFi Watchdog 4.0

Unlike AirMagnets Enterprise 5.0 and other wireless IDSes (intrusion detection systems), which use location tracking simply to display possible locations of wireless devices on...

Spyware Is a Virus

It started out as a trickle. Our help desk was getting calls about slow PCs, Web browsers that werent functioning correctly and home pages...

Symantec Aims for Data Integrity

Symantec Corp. is launching a new corporate strategy fusing security and risk management, a concept that the company is calling information integrity. The strategy, unveiled...

Network-Based Security Grows

As enterprises scramble for security specialists to help lock down their networks, managed security services providers are developing increasingly sophisticated tools that take the...

Anti-Spyware Vendor Takes Heat Over Adware Deal

The presidential election has nothing on the debates in the anti-spyware industry. An announcement last week from adware vendor WhenU and anti-spyware company Aluria...

New IE Flaw Spoofs URLs

A series of HTML-based exploits allow a malicious HTML programmer to direct a user to a different Web site than the one indicated in...