Quantcast
Channel: security news – Cyber Parse – Cyber Security and Information Security
Browsing all 4495 articles
Browse latest View live

TruStar Raises $2M to Further Develop Security Info-Sharing Tech

A seed round of funding will enable further development of TruStar's security information-sharing technology. The need to share security information to help defend against attacks is often considered a...

View Article


Dell Goes Proactive in Endpoint Security by Adding Cylance

Cylance's security package, already in use by a number of government agencies, has been charted to stop a whopping 99 percent of malware and advanced persistent threats. Dell on Nov. 17 added a new...

View Article


Chipotle allows job applicant to access its HR emails

US restaurant chain didn't own the 'chipotlehr' domain name, despite using it to respond to job seekers

View Article

Halton Equips Caretaker Teams With 1st Touch Mobile

Halton Housing Trust has chosen Caretaker Software from 1st Touch (www.1sttouch.com). The software will be used by Halton’s Estate Services and Environmental teams across 140 communal flat blocks and...

View Article

Windows 10 is ‘the most secure operating system, ready for deployment in all...

As fears over cyber terrorism grow, Microsoft wades into the cyber-security conversation

View Article


Unisys Recognised by Two Respected Industry Analyst Firms for Leadership in...

Company positioned as a “Leader” in NelsonHall evaluation of managed security services and as a “High Performer” in HfS Research “Trust-as-a-Service” reportLondon, UK, November 18, 2015 – Unisys...

View Article

Microsoft Opens Cyber Defense Operations Center

The new facility will gather expertise from various Microsoft business units for proactive, intelligence-driven security services and software enhancements. More than many other technology companies,...

View Article

IT Managers Struggling to Keep Up With Cyber-Threats: Security Experts

NEWS ANALYSIS: Security experts say building in-depth cyber-defenses is the best way to resist the increasingly sophisticated attacks on enterprise networks. DALLAS—Sometimes unanimity is refreshing,...

View Article


Survey Data: IT and End Users Disagree on What Makes a Good Desktop Experience

AppSense 2015 Desktop Experience Study Shows IT is Enforcing Desktop Limitations that Impact Workforce Productivity SUNNYVALE, Calif., November 19, 2015 – An intensive study of end users’ satisfaction...

View Article


Avanan Building a Cloud of Clouds for Security

The startup exits stealth mode with a new approach to enabling security in the cloud. There are a lot of vendors with different security technologies, any one of which might be helpful to an...

View Article

Blackhole Exploit Kit Makes a Comeback

Although the author of Blackhole was arrested in 2013, the exploit kit has risen again as malware developers make use of leaked code from the software. The once-popular Blackhole exploit kit has...

View Article

Qylur System Uses Big Data to Improve Levi’s Stadium Security

New technology that is landing at Levi's Stadium takes a robust approach to physical security. An unfortunate reality of the times we live in is the fact that any large gathering of people is...

View Article

Chimera Ransomware Uses Peer-to-Peer for Decryption

A recent ransomware operation uses an uncommon peer-to-peer system to collect data about users and distribute the important security keys to those who are willing to pay to get their data back. A...

View Article


A Look at What Security Vulnerabilities Are Worth

Over the years, many vendors and security researchers have attempted to put a price on the value of a vulnerability. In some cases when bug bounties have been paid out, there has been transparency,...

View Article

Context Information Security Joins “Bit9 + Carbon Black Connect” Alliance...

LONDON, UK—November 23, 2015—Context Information Security has joined the “Bit9 + Carbon Black Connect” Alliance Program as an incident response (IR) partner. Bit9® + Carbon Black® is the market leader...

View Article


Starwood Hotels Fell Victim to Data Breaches at 54 Locations

Starwood Hotels and Resorts is investigating data breaches at 54 locations. Attackers gained access to credit card information. Starwood Hotels and Resorts reported that it was the victim of data...

View Article

How Android Malware Lurks in Adult Apps

Zscaler finds two instances in which mobile malware authors are luring victims with lurid Android apps. Android mobile malware is able to infiltrate user devices in many ways and, according to...

View Article


Startup Fortscale Updates Security Suite, Banks $16M in VC

Fortscale's user behavior-analytics package can identify and eliminate insider threats by using machine learning, analytics capabilities and context-based alerting. Fortscale Security, a new-gen...

View Article

Real-time analytics and money-saving specialist EveryWare launched

EveryWare uses the Internet of Things to save businesses moneyStratford-upon-Avon, 24 November 2015: A pioneering real-time analytics specialist – EveryWare – has today been launched, with the aim of...

View Article

AdaptiveMobile releases intelligence report detailing how new Grey Route...

Company identifies hundreds of millions of dollars in missed revenue opportunities for operator networksDUBLIN AND DALLAS, 24 November, 2015 – AdaptiveMobile, the world leader in mobile network...

View Article
Browsing all 4495 articles
Browse latest View live