FireEye denies that it ‘tried to cover up vulnerabilities’
Security firm reportedly put a gagging order on security researcher, but claims that it was merely protecting its IP
View ArticleKony Named a Leader for Mobile Infrastructure Services by Independent...
Enterprise Mobility Company Earns Highest Score for Current Offering for its Mobility PlatformLondon, UK – 11th September 2015 – Kony, Inc., the leading enterprise mobility company, today announced it...
View ArticleEight Tactics for Circumventing Insider Security Threats
Fuse Relevant Security Data Organizations have large amounts of log, flow, packet, file, alert and threat feed data, which can yield intelligence for thwarting cyber-criminals. Ho...
View ArticleResearchers Decrypt Ashley Madison Passwords With Different Results
Although members' names and email addresses were publicly posted, their user accounts were protected with passwords secured by a powerful hashing algorithm. When adult infidelity site Ashley Madison...
View ArticleThe rise of state-sponsored cyber attacks: what companies need to know
Chris Gould, cyber leader at EY in the UK & Ireland, on why state-sponsored attacks are becoming more common, the form they take and what firms can do to protect themselves
View ArticleIntel Announces Automotive Security Review Board
Intel formed the Automotive Security Review Board, which will focus on advancing vehicle security. The board will be made up of researchers from many vendors. The topic of automotive security is hot...
View ArticleNATO Signs Onto Microsoft’s Government Security Program
To improve data security, the NATO Communications and Information (NCI) Agency will get a closer look at what makes Microsoft's software tick. NATO has signed Microsoft's newest Government Security...
View ArticleTech Allies Lobby to Keep U.S. Rule From Fettering Security Research
Criticism from a coalition of technology companies caused the U.S. government to delay implementing rules that could have hobbled security research, but the battle is far from over. When the U.S....
View ArticleIBM Lauds Apple iOS 9 Security
IBM gives props to Apple for moving to six-digit passcodes in iOS 9, as the move thwarts hackers and helps enterprises strengthen their BYOD policies. IBM, which has been an enterprise mobility partner...
View ArticleSaxo Bank uses Interoute’s advanced network to support its multi-asset...
Award winning trading platform updates currency prices 10 times every second and manages 11 billion dollars of transactions daily.London, 15th September, 2015 - Interoute, owner-operator of one of...
View Articlegateprotect presents the first UTM firewall with single-pass engine
New V15 software version offers innovative next-generation firewall. Key features are “Made in Germany” and 300% improved performance Hamburg, September 15th 2015 - With its latest V15 software version...
View ArticleInoapps Opens New City Of London HQ
Award winning Oracle Platinum Partner Inoapps (www.inoapps.com) has continued its expansion with the opening of a new Group Headquarters in the City of London. With its rapid global expansion across...
View ArticleGovernment ministers’ emails were ‘hacked by jihadists’ but ‘no security...
Could this be the first ever hack to take place with no security breach as a result? Err, No
View ArticlePA Networks’ Aperture Service Shines Light Into Shadow IT
This is all about bringing "shadow IT" out into the light. Enterprises need visibility into and control over all their data. Not feeling supremely confident about your company's data—and business data...
View ArticleFlexera Software Acquires Secunia, Adding Software Vulnerability Management...
Security Products Combined with Existing Software License Optimization and Application Readiness Solutions will Transform Software Asset Management PracticesMaidenhead, UK. - September 15, 2015 -...
View ArticleU.S. Workers Not Protecting Data Despite Threats
Rarely a week or two go by without reports of a security breach or data attack at a high-profile organization, whether it's U.S. government computers or servers at marital cheating Website Ashley...
View ArticleTogether Housing Group Moves To Enterprise Mobile Working With 1st Touch
The Together Housing Group has chosen enterprise mobile workforce software from leading mobile technology company 1st Touch (www.1sttouch.com). The software is currently being rolled out across the...
View ArticleInsider Threats a Major Security Issue for Federal Agencies
The MeriTalk survey found 51 percent of respondents say it is common for federal employees not to follow appropriate protocols. While the vast majority of federal agencies--76 percent--are more focused...
View ArticleWaitrose Partners with Spargonet to help with Notes migration
Waitrose - the Nation's Favourite Supermarket and winner of the BestSupermarket and Best Food and Grocery Retailer awards - currently has 339 shops in England, Scotland, Wales and the Channel Islands,...
View ArticleHacker 1 Admits Guilt in Attacks on 3 Businesses From 2007 to 2009
NEWS ANALYSIS: Sometimes justice takes time. Vladimir Drinkman, alias Hacker 1, finally admitted his role in the 2007 to 2009 attacks on three businesses. It has been a long, winding road that brought...
View Article