Computer Security News

Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.

HissenIT Published Application Security and Cryptography Online Trainings

Reports on cyber attacks have increased tremendously over the last years. Information technologies are the essential part of any business and a huge part in our private life. Hence, awareness of IT security on the technical level has become very important – for developers and decision makers alike. - February 06, 2016 - HissenIT

ERPScan Releases Splunk App for ERPScan Security Monitoring Suite to Simplify SAP Security Management for Enterprises

ERPScan, the leading SAP Cybersecurity and Oracle cybersecurity provider, has released a Splunk app. - February 06, 2016 - ERPScan

Kentix Most Looked Up Product at NYC ISC East Show 2015 in “Connected Security”

Kentix Most Looked Up Product at NYC ISC East Show 2015 in “Connected Security”

Kentix Innovative security –The Most Digitally looked up product at ISC east. At the ISC east new product forum several new technologies represent game changers in physical security. Security Industry experts, representatives from Government and State Agencies, and all fields of Security... - February 04, 2016 - Alternate E Source

27% of All Recorded Malware Appeared in 2015 Says PandaLabs

Growth of Internet of Things (IoT) has led to more Things being shown to be vulnerable. - January 29, 2016 - Panda Security

PATECCO is Taking Part at European Identity & Cloud Conference (EIC) 2016

As a company in the field of Identity and Access Management, PATECCO will be a sponsor and exhibitor at the European Identity & Cloud Conference 2016. It takes place May 10 – 13, 2016 at the Dolce Ballhaus Forum Unterschleissheim, Munich, Germany. EIC 2016 is known as the event where... - January 28, 2016 - PATECCO

V5 Systems Completes Testing with Safe Skies at San Jose Mineta Airport

V5 Systems’ report is available for distribution to Airport Security Coordinators at US commercial-service airports. V5 Systems, Inc. (“V5”) (www.v5systems.us), a leader in innovating wireless, on edge, intelligent security and Industrial Internet of Things (IIoT) computing... - January 25, 2016 - V5 Systems

Jetico to Showcase HIPAA Compliant Encryption at HIMSS16

Come see Jetico's HIPAA compliant encryption, calculate your data breach risk and taste Finnish chocolate at HIMSS16, booth #129. - January 21, 2016 - Jetico Inc.

Versasec Launches vSEC:CMS S4.3 Smart Card Lifecycle Management

Versasec Increases Security and Efficiency with Three Key Additional Features - Elliptic Curve Cryptography, Batch Issuance and HSM Support - January 21, 2016 - Versasec AB

Brainloop’s William O’Brien to Present at the 6th Advanced ITAR and EAR Compliance Conference

Brainloop Inc. will be Attending the Marcus Evans 6th Advanced ITAR and EAR Compliance Conference with CEO William O'Brien to Present. - January 20, 2016 - RegDOX Solutions

Qondado LLC Innovates Beyond Second Factor Authentication with KodeKey Username and Password Replacement User Auth System

Qondado LLC Innovates Beyond Second Factor Authentication with KodeKey Username and Password Replacement User Auth System

Sites and their users now have the option to login or authenticate by swiping their fingerprint on their mobile device. - January 18, 2016 - Qondado, LLC

Lightning Tools Announces the Release of a Sharepoint Permissions Management Tool for Microsoft Office 365

Lightning Tools Announces the Release of a Sharepoint Permissions Management Tool for Microsoft Office 365

Managing user permissions is often confusing within Microsoft SharePoint Online which can lead to employees gaining access to content that they should not have access to. Lightning Tools provides an add-in for SharePoint Online and SharePoint On-Premises that helps Administrators of Site Collections to report, monitor and manage permissions. - January 16, 2016 - Lightning Tools

ECL Software Announces Successful Completion of SSAE 16 (SOC 1) Audit

ECL Software Announces Successful Completion of SSAE 16 (SOC 1) Audit

ECL Software demonstrates commitment to excellence by completing successful audit. - January 16, 2016 - ECL Software

Cyber Risk Management, LLC Acquires Identity Governance and Access Management Firm APTEC, LLC

Cyber Risk Management, LLC (“CRM”) today announced a significant growth investment in APTEC, LLC (“APTEC”), a leading provider of Identity Governance and Access Management (“IAM”) solution services. APTEC provides specialized IAM capabilities to Fortune 1000... - January 13, 2016 - Cyber Risk Management

Kentix Wins 2015 AT&T  IoT Award

Kentix Wins 2015 AT&T IoT Award

Kentix Innovative Security wins 2015 IOT award sponsored by AT&T. Kentix uses multisensor technology to provide 4 security systems in one continuously monitoring and reporting critical threats to your phone. Know always anywhere servers are secure. - January 12, 2016 - Alternate E Source

V5 Systems Closes $7 Million Series A Financing

Foxlink Group leads Series A investment to expand US and international growth of V5 Systems. V5 Systems, Inc. (“V5”) (www.v5systems.us), a leader in innovating wireless, on edge, intelligent security and Industrial Internet of Things (IIoT) computing solutions announces that it has... - January 12, 2016 - V5 Systems

Alpine Security Offers Discounted CISSP Certification Training

Salary polls show CISSP-certified professionals earn an average of $12k more per year than non-certified peers. Alpine Security has just released their 2016 CISSP training schedule. - January 11, 2016 - Alpine Security

Alpine Security Introduces New Penetration Testing (Ethical Hacking) Course

Alpine Security has released the 2016 dates for their new Intro to Penetration Testing (Ethical Hacking) course. For a limited time, a $250 discount is being offered for the January 28-29 course. This penetration testing course is primarily hands-on. It is highly recommended for anyone seeking to... - January 09, 2016 - Alpine Security

CareerAcademy.com Launches the Industry’s Best Value Learning Membership Program

CareerAcademy.com Launches the Industry’s Best Value Learning Membership Program

Member benefits include Free Unlimited Access to 1,100+ IT, Cyber Security, Project Management and Business Skill video based courses with University Certificates of Completion as well as the ability to earn up to 257 PDUs and 30 College Credits. - January 08, 2016 - Career Academy

Alpine Security Releases Security+ Certification Exam Prep Course 2016 Schedule

Alpine Security just released their 2016 dates for the Security+ Certification Exam Preparation Course. This course includes a free voucher for the SY0-401 Exam. For a limited time, a $750 discount is being offered for the January 25-28 and February 22-26 courses. Alpine's Security+ course is a 5... - January 07, 2016 - Alpine Security

Direct Technology Welcomes Davood Ghods, VP of Government Practice

Direct Technology Welcomes Davood Ghods, VP of Government Practice

California technology leader joins global IT consulting firm. - January 04, 2016 - Launch Consulting Group

Strathmore’s Who’s Who Honors David E. Puckett as 2015 Professional of the Year

David E. Puckett, of Joint Base Pearl Harbor-Hickam, Hawaii, has recently been recognized as a 2015 Professional of the Year by Strathmore’s Who’s Who for his outstanding contributions and achievements in the field of Emergency Management. - December 30, 2015 - Strathmore Who's Who

Christa Iannone Joins The MCS Group

Christa Iannone Joins The MCS Group

Christa Iannone has joined MCS's Technology Solutions team as a Senior Litigation Consultant. With over 25 years of legal experience integrating law with technology, Christa will be a subject matter expert for law firms and corporate legal departments applying best practice methodologies with cost efficient solutions to everyday challenges in the area of managed services including information governance, computer forensics, e-Discovery, document review and trial support. - December 16, 2015 - The MCS Group, Inc.

Homeland Security Foundation of America Calls for New Cybersecurity Approach with Focus on Faster Vulnerability Identification and Remediation

HSFA’s Cybersecurity division strongly recommends organizations evaluate and deploy Continuous Security Delivery Fabric-based technologies. - December 16, 2015 - Homeland Security Foundation of America

Brainloop Now Offers Spanish Language Option with New Upgrade

Brainloop Inc., the industry leader in SaaS technology for secure storage, collaboration, and exchange of confidential documents, has released an updated version of its technology to include Spanish. - December 13, 2015 - RegDOX Solutions

Pocket Bits LLC Offers 1-Click Scan Feature for Bitmedic

Pocket Bits LLC (http://www.antivirusmacapp.com/) is very pleased to present the newest feature of BitMedic—the 1-Click Scan. BitMedic, the award-winning antivirus app from Pocket Bits LLC, is now offering a 1-Click Scan option for all its users. The users are to choose between the quick... - December 13, 2015 - Pocket Bits LLC

IDI Consulting Hosts Inaugural Toys for Tots Collection Campaign

IDI Consulting Hosts Inaugural Toys for Tots Collection Campaign

Pittsburgh, PA tech consulting company, IDI Consulting, is pleased to do its part for the U.S. Marines Toys for Tots collection by taking donations this holiday season. - December 11, 2015 - IDI Consulting

SureShot Software Will Help to Recover .vvv Encrypted Files and Fight TeslaCrypt Ransomware

SureShot Software Will Help to Recover .vvv Encrypted Files and Fight TeslaCrypt Ransomware

TeslaCrypt adds .vvv at the end of most of the files is a sure sign of ransomware invasion. If most of the files on your device have their names modified in the above way, blame it all on TeslaCrypt virus. - December 10, 2015 - SureShot

Nabz Software Suite Integrates Removal of the New TeslaCrypt Ransomware Virus

Nabz Software Suite Integrates Removal of the New TeslaCrypt Ransomware Virus

Cybercriminals have been really busy coining advanced iterations of ransomware hoaxes lately. One of the nasty out-turns of their crooked mindset is the TeslaCrypt virus that encrypts all victim’s files and substitutes their original extensions with .vvv format. - December 05, 2015 - Nabz Software

Security Leaders on Privileged Access Management: "We Can Do Better"

New Survey Reveals Shortfalls in How Enterprises Protect Identities In a survey conducted during the fall of 2015 by ISMG and sponsored by Hitachi ID Systems, more than 90 percent of security leaders say they are concerned about external and/or internal attackers gaining unauthorized access and... - December 04, 2015 - Information Security Media Group

LightPointe Continues Leadership in 60 GHz Wireless, Adding Industry’s First Fully Integrated Street-Level “Link Monitoring” App and AES Encryption

LightPointe Continues Leadership in 60 GHz Wireless, Adding Industry’s First Fully Integrated Street-Level “Link Monitoring” App and AES Encryption

New features open up government agency markets for wireless Distributors and Government Contractors, and provide easier and safer system installation and monitoring. - December 03, 2015 - LightPointe Communications, Inc.

Crypteron's Game-Changing Security Platform Provides Data Breach Mitigation in Minutes for Microsoft Azure Applications

With only a few lines of code, Crypteron enables organizations to apply robust, high-end security built in directly to their applications. This protects their sensitive data from data breaches by securing the data at the source. Now businesses can take full advantage of what Microsoft's Azure cloud has to offer, while being secure and compliant - all in a matter of minutes. - December 02, 2015 - Crypteron

Webinar: Opsview & OnPage - "What to do When IT Alerts Fail"

OnPage & Opsview alert notification systems empower IT teams with unprecedented and timely knowledge of what is happening across their IT environments. - December 02, 2015 - OnPage Corporation

Which Industries Best Safeguard Sensitive Information? – Aleph Tav Technologies Analyzes Industry Sectors for Their Level of Acceptance of Information Security

A large number of dynamic businesses in high-risk sectors have shown disregard and oblivion towards pressing issues such as data privacy, mission-critical asset security and strategic risk management. - November 29, 2015 - Aleph Tav Technologies Pvt. Ltd.

The Final Version of WinRAR 5.30 is Ready for Download

The Final Version of WinRAR 5.30 is Ready for Download

The classic compression program stays on course with high compatibility, support of new multipart formats and offers many other functions for security and ease-of-use. - November 27, 2015 - win.rar GmbH

ERPScan Extends Support for New ISACA and DSAG SAP Security Guidelines

Recently updated ERPScan Security Monitoring Suite for SAP now provides special templates to comply with the latest security guidelines from DSAG and ISACA. - November 27, 2015 - ERPScan

Column Information Security Announces Partner Agreement with Veracode

Information Security Solutions Leader to Resell Veracode's Automated Application Security Solutions. - November 19, 2015 - Column Information Security

InfoSec Skills Becomes ELCAS Cyber Security Learning Provider

InfoSec Skills (www.infosecskills.com) has been added to the register of approved learning providers for the Ministry of Defence's Enhanced Learning Credits Scheme (ELC). This allows UK military staff who are eligible for ELCAS credits to spend their grant on pursuance of a cyber security career,... - November 19, 2015 - InfoSec Skills

US Media Studios’ Programming Highlights Small Business Cyber Security

US Media Studios’ programming reviews cyber security for small businesses. - November 19, 2015 - US Media Studios

FireStream Worldwide and BigRoad, Inc. Announce Partnership to Combine Hours of Service Compliance and Delivery Dispatch Automation for the Downstream Petroleum Industry

FireStream Worldwide and BigRoad, Inc. Announce Partnership to Combine Hours of Service Compliance and Delivery Dispatch Automation for the Downstream Petroleum Industry

BigRoad Inc., a leading provider of electronic safety and compliance solutions for the freight industry, and FireStream Worldwide, a leading provider of automation solutions for the downstream and midstream petroleum market announced today a partnership that will provide robust Hours of Service... - November 18, 2015 - FireStream WorldWide

Home Cyber Defense Wants to Educate the Public About Cyber Threats

Mike File is the owner and head of the House of File Technologies based in Dickinson, TX. The House of File Technology Lounge in Dickinson is a technology training center and also offers website and mobile application development. - November 05, 2015 - Home Cyber Defense

Cintel Announces Software Agreement with Vigilant Solutions

Cintel is pleased to announce its agreement with Vigilant Solutions to offer a hosted license plate recognition (LPR) software solution for commercial clients in the United States. Under the agreement, Cintel will now offer the nation’s first hosted LPR software platform for commercial... - November 03, 2015 - CINTEL

CipherTooth Releases First "Spoof Proof" Login Process

CipherTooth has just released the first and only log in process that can't be spoofed. - November 02, 2015 - CipherTooth, Inc

Aerial Solutions, Inc. Uses SureLock and SureFox to Keep Android Tablets Secure for Its Crew

Aerial Solutions, Inc., an aerial saw side trimming company chose mobile lockdown solutions from 42Gears to get total control over company-owned Android tablets and optimize business flow. - October 28, 2015 - 42Gears Mobility Systems Pvt Ltd.

ERPScan Took a Closer Look at Oracle EBS Security, 6 Vulnerabilities Patched in Recent Update

ERPScan has announced today that Oracle released updates for 6 vulnerabilities identified by ERPScan researchers. - October 24, 2015 - ERPScan

Versasec Introduces vSEC:CMS S-Series 4.2 Smart Card Lifecycle Management

Versasec Creates Two Distinct Products, Adds Increased Speed and Scalability Features and Simplifies Pricing - October 24, 2015 - Versasec AB

The Bunker and Storage Made Easy Provide UK and EU Customers Secure Cloud Based Enterprise File Share and Sync

The Bunker and Storage Made Easy Provide UK and EU Customers Secure Cloud Based Enterprise File Share and Sync

The Bunker, a trusted partner for compliant and secure outsourced infrastructure and data storage, now provides support for Storage Made Easy secure enterprise file share and sync fabric in combination with CleverSafe Ultra Secure Object Storage Cloud service. - October 22, 2015 - Storage Made Easy

Dell Southeast Partner of the Year

Dell Southeast Partner of the Year

Mavenspire, a leader in data center solutions, has been named Dell Southeast Region Partner of the Year at the DellWorld PartnerDirect Summit in Austin, Texas. - October 22, 2015 - ZRC Media LLC

Park Place International Offers Latest High Availability and Low-RTO Disaster Recovery Solutions for MEDITECH

Park Place International (PPI), a provider of technology solutions for the MEDITECH Healthcare Information System (HCIS) and the healthcare enterprise, is pleased to offer an expanded set of advanced High Availability solutions certified for MEDITECH and also available for over 100 other healthcare... - October 21, 2015 - CloudWave

Datarecovery.com Warns Windows Users to Avoid Accidental OS Upgrades

Datarecovery.com Warns Windows Users to Avoid Accidental OS Upgrades

Datarecovery.com, Inc. is warning Windows users of a potential data loss hazard related to automatic Windows updates. - October 19, 2015 - Datarecovery.com, Inc.

New CyberScrub 6.0 Compatible with Dropbox®, Google Drive®, One Drive® & More - Encrypted Infinity Safe™

The new CyberScrub Infinity Safe™ allows individuals to encrypt files and pictures before storing on Dropbox®, Google Drive®, One Drive® and more. - October 14, 2015 - CyberScrub

Press Releases 1,451 - 1,500 of 3,312