HomeCybersecurity

Cybersecurity

Avocent Toughens Mobile Device Security

Despite the growing threat of unmanaged mobile devices, few enterprises are heeding the warning. Forrester Research Inc. recently reported that only 9 percent of companies...

Yoran and Spafs Law

In his book "Practical Unix and Internet Security," Professor Gene Spafford of Purdue University spells out Spafs first principle of security administration: "If you...

Users Want Freedom to Be Wrong

People resent involuntary risks. In studies of the unconscious trade-off thats made between acceptable risk and reward, it appears that an imposed risk seems...

Silex Adds Biometric Devices, Software

Silex Technology this week will launch new biometric fingerprint readers and authentication software to help safeguard data on PCs, laptops and PDAs.The new devices...

Check Point Refines InterSpect

As vendors pour into the internal security market, Check Point Software Technologies Inc., among the first entrants in this space, continues to refine its...

VirusScan 8.0i Goes Proactive

In VirusScan Enterprise 8.0i, McAfee has beefed up its enterprise-grade, host-based anti-virus solution to proactively deal with worms and malware that may not yet...

Is Check 21 a Door to Mass Fraud?

Check-fraud versions of phishing scams are a possibility once Check 21 becomes law. According to a recent study by Surrey, U.K.-based Next Generation Security...

Cash Pours In for E-Mail Security Vendors

Continuing a hot streak for e-mail security vendors, IronPort Systems Inc. on Monday announced a $45 million funding round. The San Bruno, Calif., company...

AOL to Support Sender ID E-Mail Standard

America Online Inc. will support a new, modified version of the Sender ID e-mail authentication specification that is being submitted to the IETF for...

Will Passphrases Foretell the Death of Pa55.W0rd5?

How long and complex should a password be? At what point is it effectively uncrackable?Time out: Look at that opening paragraph. Its 87 characters...