Shavlik Unveils Protect 9.2 For More Efficient Patch Management
New Release Features Increased Speed, Automation And Flexible SchedulingNow Integrates with Newly Released Shavlik EmpowerSupport for Mac OS X through Shavlik EmpowerLondon, UK - October 19, 2015 -...
View ArticleShavlik Launches New Cloud-Based Platform, Shavlik Empower
New Shavlik Platform Leverages Cloud Technology to Bring Increased Security and Operational EfficiencyLondon, UK - October 19, 2015 - Shavlik today announced availability of Shavlik Empower, a new...
View ArticleChange.org Petition Calls for Microsoft to Revamp Windows 10 Updates
Thousands sign a Change.org petition asking Microsoft's CEO to address Windows 10's controversial update policies. Microsoft's Windows 10 update policy, though meant to respond more nimbly to a...
View ArticleHow to hack Hadoop (and how to prevent others doing it to you)
All you need is Zenmap and Terminal on a default distro
View ArticleDeutsche Telekom partners with Wandera
New partnership enhances Enterprise Mobility Portfolio of Deutsche Telekom.Wandera’s Secure Mobile Gateway now extended to Deutsche Telekom`s international business customers.Deutsche Telekom has...
View ArticleRed Hat Doubles Down on Container Security
Red Hat partners with Black Duck to provide Deep Container Inspection in an effort to secure containers. As Docker container use grows in the enterprise, so too do concerns about the security and...
View ArticleThales Group Acquires Vormetric for Data-Centric Security IP
Data-centric security is about securing the data first, rather than applications, storage or networking. Thales Group, a longtime securer of virtualized systems and a provider of data protection to the...
View ArticleMicrosoft Exec Weighs In on Safe Harbor’s Demise
After a recent court ruling invalidated the EU-U.S. Safe Harbor agreement, Microsoft's top lawyer calls for a new privacy-enhancing legal framework. On Oct. 6, the European Union's (EU) top court ruled...
View ArticleChina Is Still Hacking U.S. Companies Despite Pact, CrowdStrike Finds
A month after an historic agreement between President Obama and Chinese President Xi Jinping to limit cyber-attacks between the two countries, little has changed. During Chinese President Xi Jinping's...
View ArticleDell Ramps Up Network, Data Security Portfolio
At Dell World, the company previews a new APT protection service while adding to its lineup of Dell Data Protection solutions. AUSTIN, Texas—Dell officials at the Dell World 2015 show here are showing...
View ArticleGoogle Joins Yahoo, AOL in Adopting Stricter Email Authentication
Google is joining Yahoo and AOL in implementing Domain-based Message Authentication, Reporting and Conformance checks to reduce email fraud. Google is tightening its policy for handling emails that...
View ArticleHigh-Tech Bridge launches free PCI and NIST compliant SSL/TLS security service
High-Tech Bridge, a leading provider of web application security via its award-winning solution ImmuniWeb®, is pleased to announce a free online service designed to check SSL/TLS security of a web...
View ArticleCytegic Raises Angel Funding for Tools That Forecast Cyber-Security Risk
The company that was founded by top Israeli Air Force and intelligence officials sets its sights on the global market. Cyber-security vendor Cytegic today is announcing that it is raising a $3 million...
View ArticleHP Sells TippingPoint Security Division to Trend Micro for $300M
As HP's split nears, the company is divesting its TippingPoint network security business unit, which isn't considered to be core to HP Enterprise's mission. Just ahead of HP's historic corporate split,...
View ArticlePolice and industry ‘lack consistency’ and must work together to improve...
Police, cyber-security industries and consumers all have a role, suggests Partners Against Crime report
View ArticleCredit Card Processors: The Weak Spot in EMV Adoption
NEWS ANALYSIS: Small businesses testifying before the House Committee on Small Business shared tales of woe and pleaded for chip-and-PIN technology. It's rare for witnesses invited by both political...
View ArticleEncap Security forms advisory board with financial services leaders
Industry experts have been appointed to strengthen future decisions and drive business expansionOslo & Palo Alto, 22nd October 2015 – Encap Security, provider of uncompromising authentication for...
View ArticleUnisys-led Consortium Wins Contracts to Enhance Border Control and Data...
Unisys and partners sign new agreements with eu-LISA designed to help EU countries better manage their borders and improve security of critical data London, UK 22 October, 2015 – Unisys Corporation...
View ArticleBusinesses have a ‘false sense of security’ when it comes to cyber crime
'Major gap between the perception and reality of security breaches among businesses,' warns Illex International Breach Confident Index ...
View ArticleThe Russians are coming! Recession encourages Russian hackers to ‘go west’
Unemployment caused by sanctions and low oil prices means more cyber attacks from highly skilled Russian IT specialists
View Article