SafeSquid lets you create unlimited and extremely granular Internet Policies to define and deal with unlimited number of unique factors...
Showing results 1 to 20 of 218
The Passpoint specification for seamless and secure wireless network authentication now has on-the-spot provisioning and more operator policy control.
Social networking meets social security, as the Cabinet Office reveals it is considering Facebook as one of the firms whose login process can be used to get access to government services such as applying for a driver's licence.
Technology remains nascent and will need to "prove itself" to financial institutions its effectiveness as an authentication tool over more mature methods such as biometrics, say observers.
update New breed of sophisticated financial fraud campaign targets high balance accounts from financial institutions to siphon money from there to automated mule accounts, research finds. One McAfee exec says Asia was not spared either.
Organizations tend to trust manufacturers to ensure hardware in one's IT infrastructure stay safe, but more impetus needed to develop tools to safeguard device integrity, watchers urge.
ClearBox Enterprise RADIUS Server provides businesses with the strongest available Wi-Fi network security. The product enables centralized...
Complexity arises as merchants with little knowledge of security enter market and vendors not focus on safeguarding technology, thus making standards for mobile payments a necessity, PCI exec notes.
Country's upcoming cybersecurity policy will designate agencies to gather intelligence abroad and carry out offensive cyber-operations if necessary, to prepare for possibility of cyberattacks targeting critical infrastructure.
SafeSquid Personal is a Free Web Filter Proxy Server for Windows. SafeSquid Web Filter gives you Total Access Control, Total Content...
While authentication is focused on who is allowed to have access to an application, or the network, for example, entitlements management is finer grained access control and intended to move beyond authentication.
update Social networking site reveals some of the reported 6.4 million passwords stolen matched its users; is taking measures to protect users and make passwords more difficult to hack.
Tough economic climate and low capital base mean small and midsize businesses not focusing on security, but being ill-prepared might hamper their survival efforts, market players warn.
Access governance's importance growing as IT and business intertwine, but costs of implementation need not increase with holistic approach, observers say.
Governments need to work with IT industry to root out issue of region becoming growing source and target for DDoS attacks, says Akamai exec.
Misconception that going non-digital will be more secure amid rising concerns over cyberespionage; instead it is not practical and companies embrace benefits of new technology with proper safeguards, security players note.
Advanced persistent threats not just targeted at senior executives of enterprises and government agencies but SMBs and junior staff too, exec says, adding that employee education vital to curbing such attacks.
Controlling types of data allowed to be shared on public personal cloud a step in ensuring sensitive data is kept secret, say market players.
Revenues for small and midsize business multifunction firewalls in Asia-Pacific grew 31.8 percent in 2011 to reach US$204 million.
update Five more trading firms including AmFraser Securities and UOB Kay Hian to offer two-factor authentication token to better safeguard online transactions, but user convenience issues need to be ironed out.
Attacks last year show high level of sophistication by Chinese hackers, reveals official from U.S. National Security Agency, who says China has been stealing "a great deal" of military data from United States.
Country chalks up billions of ringgit in losses over last five years to cybercriminals, reveals government official, who notes cybersecurity awareness still low among organization and individuals.
Industry opinions differ, with one camp highlighting need to focus on data amid growing adoption of cloud services and another pointing instead to handsets since threats vary with various platforms.