Google vendor security review tool goes open source
Choose-your-own-adventure must be solved before entry to the Gates of Google. Or yours Google's decided that the first-phase questionnaire it uses to vet vendors might be useful to the rest of the...
View Article2016 Security 100: 20 Coolest SIEM And Threat Detection Vendors
Coolest SIEM And Threat Detection Vendors With an escalating amount of threats hitting businesses every day, the importance of security incident and event management and threat detection technologies...
View ArticleThreatStream Changes Name To Anomali, Adds New Products
The security vendor formerly known as ThreatStream used the RSA conference in San Francisco as a launching platform for its new name, Anomali. "Anomali is the world's leading threat intelligence...
View ArticleSecret court approves classified rule change on how FBI can use NSA data
On Tuesday, The Guardian reported that the Federal Bureau of Investigation (FBI) has changed its rules regarding how it redacts Americans’ information when it takes international communications from...
View ArticleDataVisor Debuts User Analytics for Security
VIDEO: Yinglian Xie, CEO and co-founder of DataVisor, discusses her firm's new technology that makes use of unsupervised analytics to combat online fraud. There is an increasing consensus among...
View ArticleeWEEKchat March 9: Is Data-Centric Security the Future?
This will be a particularly timely eWEEKchat conversation on how security is moving ahead in the nascent IoT age. On Wednesday, March 9, at 11 a.m. PST/2 p.m.EST/7 p.m.GMT, @eWEEKNews will host its...
View Article2016: Bad USB sticks, evil webpages, booby-trapped font files still menace...
So update your software – now! Patch Tuesday Microsoft has published the March edition of its monthly security updates, addressing security flaws in Internet Explorer, Edge and Windows, while Adobe has...
View ArticleThreatTrack Vipre Antivirus 2016
ByNeil J. Rubenking Vipre has been a name to conjure with in the antivirus business for quite some time.The product has changed over the years, bouncing from company to company and, at one point,...
View ArticleChina is building a big data plaform for “precrime”
It's "precrime" meets "thoughtcrime." China is using its substantial surveillance apparatus as the basis for a "unified information environment" that will allow authorities to profile individual...
View ArticleBoffins bust biometrics with inkjet printer
Printed electronics makes the perfect fake fingerprint Boffins from Michigan State University have loaded up an inkjet printer with cartridges designed for printing electronic circuits, and used the...
View ArticleSamsung To Launch Certification Program For Samsung Knox Mobile Security...
Samsung is planning to launch a new partner certification program for its Samsung Knox mobile security platform aimed at helping solution providers generate new revenue from their mobile business....
View ArticleGoogle Offers Tool to Help Evaluate Vendor Security
The vendor security evaluation framework provides questions that organizations need to ask to accurately assess a third-party's security and privacy readiness, Google said. Google has released a...
View ArticleMicrosoft seeks Comcast subpoena to nab activation pirates
IP address behind thousands of bootleg Windows, Office, Server installations. Microsoft has asked a US court to issue a subpoena to Comcast, in a bid to obtain subscriber-to-IP address information on...
View ArticleZylpha Launches New Version of Its MOJ Portal Integration
Press Release Zylpha (www.zylpha.com), the UK’s leading legal systems innovator has launched a new version of its widely acclaimed MoJ (Ministry of Justice) Portal integration.The software, which...
View ArticleCyber-crooks now prefer ransomware to botnets. Yep, firms are paying up
CryptoWall most prevalent nasty – survey File-encrypting ransomware has eclipsed botnets to become the main threat to enterprises, according to Trend Micro. During the fourth quarter of 2015, 83 per...
View ArticleFrance votes to penalize companies for refusing to decrypt devices, messages
Richard Ying et Tangui MorlierFrench parliamentarians have adopted an amendment to a penal reform bill that would punish companies like Apple that refuse to provide decrypted versions of messages their...
View ArticleMalware-flingers check out credit card data from Rosen Hotels
18-month-long slurp grabbed expiry dates, codes – the lot US chain Rosen Hotels & Resorts has become the latest to confirm a malware-based breach of its payment processing systems. The breach...
View ArticleCRN Exclusive: Okta Extends Partner Program To Jump On Opportunity For...
Okta is teaming up with partners to take on the federal market, unveiling a targeted expansion of its partner ecosystem Wednesday to push its red-hot identity and access management solutions into the...
View Article2016 Security 100: 20 Coolest Web And Application Security Vendors
Coolest Web And Application Security Vendors There's been a lot of talk in the security industry about the death of the perimeter, as protection technologies on the edge of the network have proven to...
View ArticleCVE bug system has bugs – quick, use this alternative, say hackers
Allege critical software vulns ignored in huge backlog Frustrated security professionals acting on behalf of equally irritated researchers unable to gain Common Vulnerabilities and Exposures (CVE)...
View Article