Core Facts - British mobile innovator TenBu Technologies has created a gadget that secures mobile phones (and other valuables from netbooks to key rings) by creating a personal burglar alarm system powered by Bluetooth wireless technology. - nio consists of a Bluetooth tag with an innovative software link that downloads directly onto the user’s mobile phone, creating a personalised security zone of up to 25 metres. - The security zone protects both the mobile phone and the Bluetooth tag, which may be attached to another valuable item, such as a set of keys or a laptop. - When the security zone between the mobile phone and tagged item is breached, both emit an audible alarm. A flashing blue light on the tag is also triggered. - Named after the Japanese Guardian Kings, nio™ is a handy, convenient way of preventing the loss and/or theft of portable devices such as Blackberrys, laptops and memory sticks.

Read more: nio - your new gadget guardian

Discover the Key Differentiators and Future Vision for Identity Management and Database Security

London, UK – September 8, 2009
News Facts On September 15th 2009, at the Mayfair Hotel, London, Oracle will host Oracle Security Inside Out Summit, an event designed to help organisations discover sustainable and affordable ways to protect themselves against security breaches. Oracle will also offer strategic insight into the latest innovations in security and compliance technologies Security and compliance solutions to be covered at the summit include database security, identity management, fraud prevention and compliance automation Des Powley, Technical Director, Security and Identity Management, Oracle, will be discussing the security risks faced by modern enterprises today and how best to tackle these through Application-Centric Identity Management Application-Centric Identity Management is the next phase of identity management, as it enables the management of identities within applications as part of their business process, while preserving the benefits of a centralised identity management system.

Read more: Oracle Security Inside Out Summit Explores Sustainable and Affordable Ways to Protect Enterprises...

Thales extends strong authentication and ID management product line with secure streamlined access to multiple applications

Thales, leader in information systems and communications security, announces SafeSign Single Sign On, the latest addition to the SafeSign strong authentication and ID management product line.  SafeSign Single Sign On delivers simplified strong authentication for organizations concerned with ever increasing security threats, rising help-desk costs and frustration with managing multiple and complex passwords.

SafeSign Single Sign On provides simplified secure access to sensitive applications through strong authentication, requiring the user to identify himself only once at the start of a session. SafeSign Single Sign On enables suitable authentication logon policies to be enforced in order to meet a diverse set of business requirements. 

Read more: Thales launches SafeSign Single Sign On

2nd September 2009 - Reports that a North Carolina business has been left with a $2,500 phone bill after phone phreakers hacked its PBX via the firm's toll-free (freephone) number shows the danger of failing to audit all aspects of a systems' software, says Fortify, the application vulnerability specialist.   "What this case shows is that, although the PBX supplier may have verified the security of the front line telephony interface on its PBX systems software, the hackers were able to break in via the side door effectively offered by the toll-free number," said Richard Kirk, Fortify's European Director.   "This is because a growing number of toll-free service providers support access to the direct dial inwards (DDI) numbers seen on the PBX systems of small-to-mid-sized enterprises," he added.   And, says Kirk, since these DDI numbers are mapped directly on to PBX extensions, the security levels on this side door method of access is often a lot less than the front door, the firm's main telephone number.  

Read more: Toll-Free PBX hack highlights need for code auditing says Fortify

New Application Identity Manager Provides the Most Secure and Robust Authentication Methods for App2App Environments to Help Streamline and Support Audit Requirements

London – September 2, 2009 – Cyber-Ark, the leading global software provider for protecting critical applications, identities and information, today announced enhancements to its Privileged Identity Management  Suite.  The suite includes a new version of its Application Identity Manager™ that features the most secure and robust authentication methods for App2App environments, resulting in greater compliance, security and corporate accountability while dramatically simplifying large scale projects for eliminating hard-coded passwords.

Read more: Cyber-Ark Launches Latest Identity Management Suite