TruStar Raises $2M to Further Develop Security Info-Sharing Tech
A seed round of funding will enable further development of TruStar's security information-sharing technology. The need to share security information to help defend against attacks is often considered a...
View ArticleDell Goes Proactive in Endpoint Security by Adding Cylance
Cylance's security package, already in use by a number of government agencies, has been charted to stop a whopping 99 percent of malware and advanced persistent threats. Dell on Nov. 17 added a new...
View ArticleChipotle allows job applicant to access its HR emails
US restaurant chain didn't own the 'chipotlehr' domain name, despite using it to respond to job seekers
View ArticleHalton Equips Caretaker Teams With 1st Touch Mobile
Halton Housing Trust has chosen Caretaker Software from 1st Touch (www.1sttouch.com). The software will be used by Halton’s Estate Services and Environmental teams across 140 communal flat blocks and...
View ArticleWindows 10 is ‘the most secure operating system, ready for deployment in all...
As fears over cyber terrorism grow, Microsoft wades into the cyber-security conversation
View ArticleUnisys Recognised by Two Respected Industry Analyst Firms for Leadership in...
Company positioned as a “Leader” in NelsonHall evaluation of managed security services and as a “High Performer” in HfS Research “Trust-as-a-Service” reportLondon, UK, November 18, 2015 – Unisys...
View ArticleMicrosoft Opens Cyber Defense Operations Center
The new facility will gather expertise from various Microsoft business units for proactive, intelligence-driven security services and software enhancements. More than many other technology companies,...
View ArticleIT Managers Struggling to Keep Up With Cyber-Threats: Security Experts
NEWS ANALYSIS: Security experts say building in-depth cyber-defenses is the best way to resist the increasingly sophisticated attacks on enterprise networks. DALLAS—Sometimes unanimity is refreshing,...
View ArticleSurvey Data: IT and End Users Disagree on What Makes a Good Desktop Experience
AppSense 2015 Desktop Experience Study Shows IT is Enforcing Desktop Limitations that Impact Workforce Productivity SUNNYVALE, Calif., November 19, 2015 – An intensive study of end users’ satisfaction...
View ArticleAvanan Building a Cloud of Clouds for Security
The startup exits stealth mode with a new approach to enabling security in the cloud. There are a lot of vendors with different security technologies, any one of which might be helpful to an...
View ArticleBlackhole Exploit Kit Makes a Comeback
Although the author of Blackhole was arrested in 2013, the exploit kit has risen again as malware developers make use of leaked code from the software. The once-popular Blackhole exploit kit has...
View ArticleQylur System Uses Big Data to Improve Levi’s Stadium Security
New technology that is landing at Levi's Stadium takes a robust approach to physical security. An unfortunate reality of the times we live in is the fact that any large gathering of people is...
View ArticleChimera Ransomware Uses Peer-to-Peer for Decryption
A recent ransomware operation uses an uncommon peer-to-peer system to collect data about users and distribute the important security keys to those who are willing to pay to get their data back. A...
View ArticleA Look at What Security Vulnerabilities Are Worth
Over the years, many vendors and security researchers have attempted to put a price on the value of a vulnerability. In some cases when bug bounties have been paid out, there has been transparency,...
View ArticleContext Information Security Joins “Bit9 + Carbon Black Connect” Alliance...
LONDON, UK—November 23, 2015—Context Information Security has joined the “Bit9 + Carbon Black Connect” Alliance Program as an incident response (IR) partner. Bit9® + Carbon Black® is the market leader...
View ArticleStarwood Hotels Fell Victim to Data Breaches at 54 Locations
Starwood Hotels and Resorts is investigating data breaches at 54 locations. Attackers gained access to credit card information. Starwood Hotels and Resorts reported that it was the victim of data...
View ArticleHow Android Malware Lurks in Adult Apps
Zscaler finds two instances in which mobile malware authors are luring victims with lurid Android apps. Android mobile malware is able to infiltrate user devices in many ways and, according to...
View ArticleStartup Fortscale Updates Security Suite, Banks $16M in VC
Fortscale's user behavior-analytics package can identify and eliminate insider threats by using machine learning, analytics capabilities and context-based alerting. Fortscale Security, a new-gen...
View ArticleReal-time analytics and money-saving specialist EveryWare launched
EveryWare uses the Internet of Things to save businesses moneyStratford-upon-Avon, 24 November 2015: A pioneering real-time analytics specialist – EveryWare – has today been launched, with the aim of...
View ArticleAdaptiveMobile releases intelligence report detailing how new Grey Route...
Company identifies hundreds of millions of dollars in missed revenue opportunities for operator networksDUBLIN AND DALLAS, 24 November, 2015 – AdaptiveMobile, the world leader in mobile network...
View Article