Security | News, how-tos, features, reviews, and videos
How do you reconcile user identities across organizational boundaries? Sxip wants you to use its appliance
Fortify offers a code-level line of defense against those who would attack enterprise Web applications to wreak havoc or reap ill-gotten gains
With ConSentry's LANShield appliance, enterprises gain new control over network access without new switches or sluggish software solutions
InfoWorld selects 15 startups whose technologies meet tough IT challenges and introduce intriguing new capabilities
With Akimbi's virtual environments, IT can test and deploy multiple configurations with far less overhead
Using AJAX, Zimbra delivers a surprisingly rich Web-based e-mail client, but its mail server and extensive integration capabilities are equally impressive
Enterprise reality could dampen Vista's shock
Independent researcher Tom Ferris said there were still holes in Safari, QuickTime, and iTunes that he reported to Apple but were not patched in the latest release
New method marks important step on the road to commercial use of quantum cryptography
Hackers attack affects online ticket-buying in the southeastern U.S.