Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and choose the applications they want and...
Discover how Trend Micro solutions, powered by The Smart Protection Network can help you reduce malware related incidents and support calls by up to...
We assessed the Juniper SRX 5800 in terms of performance, features and usability. Because the product is marketed as a security appliance, our tests...
An alarming 2 out 8 Independent Oracle User Group (IOUG) members surveyed for the 2008 IOUG Data Security Report stated a data breach over the coming...
Shutting down zero-day computer attacks could be carried out inexpensively by peer-to-peer software that shares information about anomalous behavior,...
My predictions for information security in 2009 are just predictions, not recommendations. I am trying to guess what will happen, not suggesting what...