Malware Threat Comes Full Circle to Focus Again on End Users
NEWS ANALYSIS: In recent years, the primary malware and cyber-crime threat had shifted to attacking servers, But cyber-attacks have turned their focus back to endpoints. WASHINGTON—The SINET security...
View ArticleBay Dynamics Partners With Skyhigh to Improve Threat Detection
Bay Dynamics' new partnership with Skyhigh Networks helps to accelerate the detection of insider risks. Ryan Stolte, co-founder and CTO at Bay Dynamics, isn't a newcomer to the security space. Stolte...
View ArticleAdware Programs Pose as Popular Apps, Root Android Devices
Mobile security firm Lookout detected thousands of samples of malicious adware masquerading as legitimate applications, but which root victims' systems to reap a few dollars in ad revenue. Over the...
View ArticleParliament to open inquiry into data security following TalkTalk breach
MPs to look at the 'nature, role and importance of encryption' at the same time
View ArticleProtonMail Learns That Paying Ransom Doesn’t Stop Attacks
When confronted by a cyber-extortionist, do you pay the ransom or do you stand firm and not negotiate? It's both an ethical and a procedural dilemma. By paying the ransom, in some respects, the victim...
View ArticleWhat FCC’s Move Against ‘Do Not Track’ Means
"Do Not Track" is in big trouble after a new U.S Federal Communications Commission (FCC) ruling against it. On Nov. 6, the FCC issued a ruling stating that major Web services, including Google,...
View ArticleSkyscape Cloud Services Announces Strategic Partnership With Cloudera
Assured cloud services company extends PaaS capability with Hadoop offeringLondon – November 10 2015 – Skyscape Cloud Services Limited, the easy to adopt, easy to use and easy to leave assured cloud...
View ArticleADLV Reports Surge in Commercial Electronic Checking Following Abolition Of...
The ADLV (Association for Driving Licence Verification) www.adlv.co.uk has reported a surge in online commercial checking from vocational fleets following the abolition of the paper driving licence...
View ArticleMetricStream Partners with NaviSite to Expand its GRC Cloud Offerings for...
LONDON, UK, 10th November, 2015 – NaviSite Europe Limited, a Time Warner Cable company today announced its partnership with MetricStream, the market leader in Governance, Risk, and Compliance (GRC)...
View ArticleFlexera Software Launches Vulnerability Intelligence Manager 2016
Enhanced product extends businesses’ ability to manage and control software vulnerability threats comprehensively across their entire application estatesMaidenhead, U.K. & Copenhagen, Denmark –...
View ArticleInternet of Things home appliances leaving users vulnerable to cyber attacks,...
Coffee machines, baby monitors and home security systems all have security vulnerabilities, say researchers
View ArticleBolton NHS Foundation Trust Chooses AppSense as the Core of its Virtual...
Healthcare Organization Decreases Logon Times from Several Minutes to 15 Seconds SUNNYVALE, Calif., November 10, 2015 – AppSense, the global leader of user environment management (UEM) solutions for...
View ArticleZylpha Webinar Unveils Extensive 2016 Product Development Plans
Legal systems innovator Zylpha (www.zylpha.com) is holding a webinar to signpost a host of key product and integration development plans for 2016. The 30 min webinar, which will be held on The 8th of...
View ArticleThales dramatically increases visibility into HSM security and operations...
Capabilities answer demand of customers who deploy hardware security modules across multiple locationsPLANTATION, Fla., November 10, 2015 – Thales, leader in critical information systems and...
View ArticleCookie Reports’ Compliance Expertise Strengthened with Specialist Advisory Board
EU Cookie Compliance Software Company Expands with Support from Advisory Board of Industry HeavyweightsLONDON, UK – November 10th, 2015 – Cookie Reports (www.cookiereports.com), an innovative British...
View ArticleSinequa and SYSTRAN Join Forces to Exhibit at Milipol, the 19th Worldwide...
Combined Solutions Empower Defense and Security Organizations to Transform Intelligence Data into InsightPARIS, France – November 10, 2015 – Sinequa, a leader in real-time Big Data search and analytics...
View ArticleARM Brings TrustZone Security Technology to IoT Devices
The company is introducing its ARMv8-M architecture, which will extend TrustZone's reach from the data center to IoT and embedded devices. SANTA CLARA, Calif.—ARM is introducing a 32-bit architecture...
View ArticleComcast Tells 200K Users to Reset Passwords in Security Threat
Hackers matched usernames and passwords on Comcast accounts with usernames and passwords they had obtained from past, shared hacks. Here's yet another example of why people need to use multiple...
View ArticleTrio Indicted in Massive JPMorgan Hack
The Heartbleed vulnerability helped in part to enable attackers to steal hundreds of millions of dollars. After a year of speculation about who was behind the massive attack against JPMorgan Chase in...
View ArticleTwistlock Aims to Shore Up Container Security With New Offering
Twistlock's new offering is designed to go beyond best practices configuration for container security to provide improved runtime security. Proper Docker container configuration is a good first step...
View Article