News

Topic: Security

Millennials putting themsevles at risk online: Norton

Norton has revealed that while people under the age of 35 are concerned about their safety online, they are not doing much to secure themselves from being victims of online crime.

Apple Increases Security for Work iPhones with iOs9

With the rise of BYOD, many companies are already on thin ice when it comes to corporate security. Apple's new mobile operating system comes with an improved security feature: a 6-digit user pin code...

Sungard Availability Services, Leader in Magic Quadrant for Disaster Recovery as a Service

WAYNE, Pa., 4/28/15 - Sungard Availability Services, a leading provider of information availability through managed IT, cloud and recovery services, announced it has been recognized by by Gartner, Inc. as a leader in the Magic Quadrant for Disaster Recovery as a Service (DRaaS).

Blackphone Will Pay You Cash to Hack It...

Blackphone, the Geneva-based manufacturer of new encrypted phone devices, encourages hackers to test the security of the safest phone available to the general public...

NICE Systems Launches Video Analytics Solution

NICE Systems announced today the release of NICE Suspect Search, a new Video Analytics Solution that can analyze help track targeted people. The solution can be paired with NiceVision and Nice Situator to offer a comprehensive security package....

Barracuda Enters the Ruckus Wireless Technology Ecosystem Program

Barracuda Networks, leading provider of cloud-connected security and storage solutions, announced that it has joined Ruckus Wireless' Technology Ecosystem program, offering enhanced security and protection to Ruckus Smart WiFi networks users.

Cloud Backup Provider IDrive Announces New Backup Protection

IDrive, a leader in cloud back-up, takes security up a notch and helps organizations better protect their virtual environments with the new Hyper-V backup protection solution.

Clone Systems Delivers Security Insights Through Big Data

Security researchers estimate over 90 percent of network threats go undetected, leaving companies vulnerable to attacks. Clone Systems's big data tool s and dashboard helps companies analyze security threats in real time from any source...

Internet of Things: With so Much Data Comes Great Responsibilities

The Internet of Things Industry is gathering tremendous amount of data, that has to be stored... And there comes a new challenge: how can so much data be stored, secured, access, analyzed - and will the current infrastructure make it?

Netskope and Box Partner to Offer New Content Security Services

Netskope and Box partner up to provide enterprises with new efficiency and security tools on Box, including data loss prevention, content discovery, policy enforcement, cloud security...

Netskope and Box Partner to Offer New Content Security Services

Netskope and Box partner up to provide enterprises with new efficiency and security tools on Box, including data loss prevention, content discovery, policy enforcement, cloud security...

Confirmation.com, a cloud-based fraud detection company, shows strong growth in 2014

Confirmation.com, a cloud-based fraud detection and efficiency software for financial audits, announced high adoption of their new platform and overall strong increase in clients...

Webroot-LogRhythm Partnership Enhances Enterprise Security Intelligence

Webroot, leader in cloud-based, real-time Internet threat detection, announces its BrightCloud IP Reputation Service, through a partnership with LogRhythm, one of the largest independent security intelligence companies in the world...

Palo Alto Networks and Westcon Group Expands Global Partnership

SANTA CLARA, Calif., - Palo Alto Networks, the leader in enterprise security, expands partnership with Westcon Group, to provide resellers with a full portfolio of technologies...

The Good and Bad of Big Data and Biometrics

Biometrics combined with Big Data makes powerful tool. Is Face recognition software a good thing that promotes security and alleviates law enforcement operations, or a breach of privacy that could lead to so many abuses?...

Check this centralized wireless intrusion (aka Google Glass) prevention and detection platform...

With the increased interest in Google Glass, people might become to be aware of the potential security issues it poses. Fluke is using the momentum to present their monitoring tool that prevents wireless intrusions, from accessing your network...

IBM acquires privately-held cyber security firm CrossIdeas

IBM acquires privately-held cyber security firm CrossIdeas to address cloud security issues and keep up with the quick changes in the data management industry. Read more

BadUSB: Big, bad USB security problems ahead

Who thought that small USB sticks could be such a security threat? Learn how a USB drive can turn into a hackers tool and what to do about it.

More Security Concerns toward the Internet of Things and Associated Connected Devices

The Internet of Things is everywhere and connected devices found their way into many households. A recent study shows that 70% of investigated devices contain serious vulnerabilities....

Splunk adds risk scoring to latest Enterprise Security app

Machine data player Splunk has released version 3.1 of its Splunk App for Enterprise Security. The company said the latest app iteration enables faster threat detection with a new risk score feature, as well as simplified access to security analytics.