The day before data broker LexisNexis increased by nearly tenfold the number of identities feared stolen in last months data breach, Sen. Dianne Feinstein...
The Microsoft security train made its scheduled monthly stop on Tuesday, dropping off eight updates to cover 18 vulnerabilities in a range of widely...
The OpenOffice.org community on Tuesday confirmed the existence of a potentially serious heap-overflow vulnerability in its freely distributed office productivity suite.
The flaw affects OpenOffice...
A private security research outfit on Tuesday warned that a "highly critical" vulnerability in the Microsoft Jet Database Engine could be exploited by malicious...
Bruce Schneier, a highly respected security expert, recently wrote an essay titled "The Failure of Two-Factor Authentication." Schneiers article has stimulated a lively debate...
Despite a continued focus on security in the nations capital, one security commodity that many government IT professionals seek above all—more information from the...
WINNER
Vernier Networks Inc.
Adaptive Security Platform 1.0
As increased device and user mobility dissolve the network perimeter as we know it, the need to provide at-connection...
WINNER
Citadel Security Software Inc.
Hercules 3.5
Designed to cope with voluminous security updates and intermittently connected mobile devices, Hercules 3.5 assists enterprise IT managers in doing...
Routing and switching giant Cisco Systems has released patches for a pair of denial-of-service and system-access flaws affecting a range of IOS-based devices.
The most...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...