Quantcast
Browsing all 4495 articles
Browse latest View live

FireEye denies that it ‘tried to cover up vulnerabilities’

Security firm reportedly put a gagging order on security researcher, but claims that it was merely protecting its IP

View Article


Kony Named a Leader for Mobile Infrastructure Services by Independent...

Enterprise Mobility Company Earns Highest Score for Current Offering for its Mobility PlatformLondon, UK – 11th September 2015 – Kony, Inc., the leading enterprise mobility company, today announced it...

View Article


Eight Tactics for Circumventing Insider Security Threats

Fuse Relevant Security Data Organizations have large amounts of log, flow, packet, file, alert and threat feed data, which can yield intelligence for thwarting cyber-criminals. Ho...

View Article

Researchers Decrypt Ashley Madison Passwords With Different Results

Although members' names and email addresses were publicly posted, their user accounts were protected with passwords secured by a powerful hashing algorithm. When adult infidelity site Ashley Madison...

View Article

Image may be NSFW.
Clik here to view.

The rise of state-sponsored cyber attacks: what companies need to know

Chris Gould, cyber leader at EY in the UK & Ireland, on why state-sponsored attacks are becoming more common, the form they take and what firms can do to protect themselves

View Article


Intel Announces Automotive Security Review Board

Intel formed the Automotive Security Review Board, which will focus on advancing vehicle security. The board will be made up of researchers from many vendors. The topic of automotive security is hot...

View Article

NATO Signs Onto Microsoft’s Government Security Program

To improve data security, the NATO Communications and Information (NCI) Agency will get a closer look at what makes Microsoft's software tick. NATO has signed Microsoft's newest Government Security...

View Article

Tech Allies Lobby to Keep U.S. Rule From Fettering Security Research

Criticism from a coalition of technology companies caused the U.S. government to delay implementing rules that could have hobbled security research, but the battle is far from over. When the U.S....

View Article


IBM Lauds Apple iOS 9 Security

IBM gives props to Apple for moving to six-digit passcodes in iOS 9, as the move thwarts hackers and helps enterprises strengthen their BYOD policies. IBM, which has been an enterprise mobility partner...

View Article


Saxo Bank uses Interoute’s advanced network to support its multi-asset...

Award winning trading platform updates currency prices 10 times every second and manages 11 billion dollars of transactions daily.London, 15th September, 2015 - Interoute, owner-operator of one of...

View Article

gateprotect presents the first UTM firewall with single-pass engine

New V15 software version offers innovative next-generation firewall. Key features are “Made in Germany” and 300% improved performance Hamburg, September 15th 2015 - With its latest V15 software version...

View Article

Inoapps Opens New City Of London HQ

Award winning Oracle Platinum Partner Inoapps (www.inoapps.com) has continued its expansion with the opening of a new Group Headquarters in the City of London. With its rapid global expansion across...

View Article

Government ministers’ emails were ‘hacked by jihadists’ but ‘no security...

Could this be the first ever hack to take place with no security breach as a result? Err, No

View Article


PA Networks’ Aperture Service Shines Light Into Shadow IT

This is all about bringing "shadow IT" out into the light. Enterprises need visibility into and control over all their data. Not feeling supremely confident about your company's data—and business data...

View Article

Flexera Software Acquires Secunia, Adding Software Vulnerability Management...

Security Products Combined with Existing Software License Optimization and Application Readiness Solutions will Transform Software Asset Management PracticesMaidenhead, UK. - September 15, 2015 -...

View Article


U.S. Workers Not Protecting Data Despite Threats

Rarely a week or two go by without reports of a security breach or data attack at a high-profile organization, whether it's U.S. government computers or servers at marital cheating Website Ashley...

View Article

Together Housing Group Moves To Enterprise Mobile Working With 1st Touch

The Together Housing Group has chosen enterprise mobile workforce software from leading mobile technology company 1st Touch (www.1sttouch.com). The software is currently being rolled out across the...

View Article


Insider Threats a Major Security Issue for Federal Agencies

The MeriTalk survey found 51 percent of respondents say it is common for federal employees not to follow appropriate protocols. While the vast majority of federal agencies--76 percent--are more focused...

View Article

Waitrose Partners with Spargonet to help with Notes migration

Waitrose - the Nation's Favourite Supermarket and winner of the BestSupermarket and Best Food and Grocery Retailer awards - currently has 339 shops in England, Scotland, Wales and the Channel Islands,...

View Article

Hacker 1 Admits Guilt in Attacks on 3 Businesses From 2007 to 2009

NEWS ANALYSIS: Sometimes justice takes time. Vladimir Drinkman, alias Hacker 1, finally admitted his role in the 2007 to 2009 attacks on three businesses. It has been a long, winding road that brought...

View Article
Browsing all 4495 articles
Browse latest View live