Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
Code Dx® Version 1.7 Protects Software Supply Chain with Increased Functionality
New Version Supports Dependency-Check, Retire.js, Pylint and Checkmarx Further Expanding Vulnerability Coverage - May 06, 2015 - Code Dx
Event Zero Selected as One of Three Partners to Offer IT Pro Tools for Skype for Business
Event Zero, a leading analytics and reporting software provider for Skype for Business (formerly Microsoft Lync), announced today it has been selected as one of only three Microsoft partners to offer IT pro tools to Skype for Business customers, helping current and future Skype for Business... - May 05, 2015 - Event Zero
New Industry Group to Advance DRM
Technology sector participants confirm that the time is right for an initiative totally focused on the advancement of digital rights management (ADRM). Internet usage trends underscore the need for improvement in access control solutions to protect the integrity of high-value content and proprietary data, provide optimal usability, and ensure the security and privacy of consumers and enterprise end-users. - May 05, 2015 - Distributed Computing Industry Association
Panda Security Announce London Partner Event - 18th June 2015
Introduction to New Brand, New Products & New Team Members; Join the growing ranks of Partners benefiting from working with Panda Security - May 01, 2015 - Panda Security
SWITSYS Announces Its First International Startup
Privacy and the protection of confidential information on the Internet are topics that are discussed heavily these days. The fact that we cannot speak about the privacy on Facebook was confirmed by the European Commission last week; moreover, the commission recommended canceling Facebook profiles. - April 28, 2015 - SWITSYS
AuthEntry Announces Convenient and Secure Passwordless Identity Access and Authentication Solution
New GateKeeperPro solution enhances users experience, security and productivity lessening the burden of having to use, remember and manage antiquated usernames and passwords for good. - April 24, 2015 - AuthEntry
Cyber Defense Magazine Announces Cyber Defense Award Winners for #RSAC 2015
Awards for Next-generation Information Security Solutions Unveiled by CDM® at RSA® Conference 2015 - April 20, 2015 - Cyber Defense Magazine
Macrium Software to Attend and Speak at IP Expo Manchester
Macrium Software, the disaster recovery solution specialists, are pleased to be exhibiting and speaking at IP Expo in Manchester on 20-21 May 2015. IP Expo is coming to Manchester for the first time this year after having successfully run the IP Expo event series through London and Europe. - April 16, 2015 - Macrium Software
Rain Networks to Distribute Stellar Data Recovery Software in North America
Partnership combines industry-leading Backup and Data Recovery software provider, Stellar Data Recovery and reseller expertise in the North American channel, Rain Networks. - April 15, 2015 - Rain Networks
AKATI Consulting Launches Alpha Computer Emergency Response Team (ACERT)
AKATI Consulting’s Alpha Computer Emergency Response Team (ACERT) has launched and ready to fight Cyber Security Incidents. - April 12, 2015 - AKATI Consulting
AKATI Consulting Joins ASEANFIC as Partner
AKATI Consulting was invited by SecureMetric Technology to be one of its supporting vendor in the ASEAN Financial Institution Conference (ASEANFIC), in Manila. Krishna Rajagopal, CEO AKATI Consulting delivered his presentation on 'E-banking and Hackers'. He spoke about the risks in E-banking and... - April 12, 2015 - AKATI Consulting
AKATI Consulting Inspires the Ethical Hackers in Sri Lanka
Krishna Rajagopal, CEO of AKATI Consulting held enlightened Ethical Hacker's forums in 2014. - April 12, 2015 - AKATI Consulting
AKATI Consulting Enlightens Law Enforcement on Cybercrimes
Krishna Rajagopal, CEO of AKATI Consulting was invited as a guest speaker to the Commercial Crime Investigation Department (CCID) Conference held in Kuala Lumpur. The presentation was titled 'What the hack?’ The objective of this CCID conference was to provide a platform for the Director of... - April 12, 2015 - AKATI Consulting
AKATI Consulting Forms Strategic Alliance with IMPACT
AKATI Consulting signed a Memorandum of Understanding (MoU) with the International Multilateral Partnership Against Cyber Threats (IMPACT) today. AKATI Consulting entered to this agreement with the objective of establishing a strategic alliance which will enable diversification of its... - April 12, 2015 - AKATI Consulting
AKATI Consulting Presents at CICRA’s Fourth Ethical Hacker’s Forum
The 4th Ethical Hacker's forum organised by CICRA Holdings was held recently in Colombo, Sri Lanka. This event was captioned ‘Security through Obscurity: Is it a Myth’. Krishna Rajagopal, CEO of AKATI Consulting was invited to enlighten the gathering at this quarterly event. Ethical... - April 12, 2015 - AKATI Consulting
World’s First Non-OTP 2-Factor Authentication Chrome App Finally Arrives
In a cybersecurity breakthrough, Cyphercor Inc. releases the first ever non-OTP (one-time password) based two-factor authentication app for desktops and laptops via Google Chrome. - April 09, 2015 - Cyphercor Inc.
For the First Time for WordPress Users, Checking Existing Comments for Spam
CleanTalk offers more protection from spam bots to sites by WordPress. The new version provides a unique opportunity to test existing spam comments. - April 08, 2015 - CleanTalk Inc
ITC Digital Announced as StratoKey UK Partner
Due to increased demand for cloud encryption and web app security in the UK, StratoKey adds ITC Digital as value-added reseller to promote and support StratoKey in the region. - April 04, 2015 - StratoKey
Cisco Industry Leader Matthew Merriman Joins Adcap, Cisco Gold Partner & Solution Integrator, as Chief Operating Officer
Adcap Network Systems, one of the top Cisco Gold Partners in the country, is excited to announce the addition of Matthew Merriman as their new Chief Operating Officer. Mr. Merriman brings over 25 years of operational experience in the Cisco partner community, including previous Vice Presidential roles at Prosys, Presidio and Solarcom. - March 25, 2015 - Adcap
M&C Associates Provides Security Audit Services to Investigate Vulnerabilities
Preventative measures ensure data and business is not compromised. M&C is now offering Security Audit Services to help its customers take preventative measures to ensure that business-critical and confidential data is not compromised. This service is available to anyone with an installed Avaya MPS IVR, Avaya Experience Portal – AAEP, or Avaya Contact Center – AACC. - March 25, 2015 - M&C Associates LLC
IEEE ICC 2015 Explores “Smart City & Smart World” Innovations from June 8 – 12 in London’s Tech City
The 2015 IEEE International Conference on Communications (www.ieee-icc.org/2015), the premier international venue dedicated to the worldwide advancement of wireless and wireline communications, will host its next annual event from 8-12 June 2015 at the ExCel London convention centre in London, UK. - March 24, 2015 - IEEE Communications Society
New Live or On-Demand Online Courses Develop Human Resources and Technology Skills for Leaders in Business of Law
The business of law is changing every day, and the Association of Legal Administrators' (ALA) eLearning Center is designed to meet the needs of industry leaders in a flexible format to fit busy schedules. Online courses can be completed either live – with peer collaboration and networking opportunities – or on-demand, at the learner’s convenience. ALA has opened enrollment for two new eLearning courses focusing on the Human Resources and Operations Management/IT subject areas. - March 24, 2015 - Association of Legal Administrators (ALA)
Eastern DataComm Introduces “CLASS” Comprehensive Lockdown Alert and Safety Solution
Eastern DataComm recently unveiled a comprehensive solution that fully automates the notification procedures a school district needs in the event of a lockdown event – whether just a drill or the real thing. “As we continue to collaborate with schools throughout New Jersey and New... - March 17, 2015 - Eastern DataComm
Weidlinger Hosts Hackathon to Inspire Innovation, Team Building
Focus on improving, developing new technical products and improving the efficiency of current practices - March 13, 2015 - Weidlinger Associates, Inc.
For the First Time in the World Stealthphone Information Security System
Mobile Trust Telecommunications company has developed Stealthphone, the first mobile phone and PC security system in the world. Stealthphone guarantees strong encryption of: Voice and data transmitted over Stealthphone IP-servers; Voice transmitted over existing communication systems: GSM, landline, satellite, IP-telephony; Data stored on PC and mobile phone. Encrypted information can be transferred in an encrypted mode via all mail services or in the social media. - March 12, 2015 - Mobile Trust Telecommunications
IEEE ComSoc Announces Spring 2015 Communications Training Schedule
New Program Promotes Real-world Expertise in Wireless, VoLTE & RCS, LTE-Advanced, M2M, Satellite, Software-Defined Networking & Broadband Mobile Satellite Communications - March 12, 2015 - IEEE Communications Society
PrivacyDuck.com Donates 30% of February, March Profits to San Francisco Mission District Fire Victims
PrivacyDuck.com is donating 30% of their February and March 2015 profits to the displaced victims of San Francisco’s January 29th Mission District fire, which left one person dead and numerous long-term residents homeless. PrivacyDuck.com - a San Francisco startup focusing on cost-effective... - March 07, 2015 - PrivacyDuck.com
DMI Enhances MYAndroid Protection App to Prevent User Data Theft and Hacked Cell Accounts Such as Snapchat and Dropbox
End-to-End Enterprise Mobility Solutions Provider Selected for Its Backend and Integration Services and Its Award-Winning User Experience Design Capabilities - March 06, 2015 - Digital Management, LLC
Cybersecurity Experts Address Data Challenges at NJIT on March 30, 2015
NJBIA President Michele N. Siekerka, Esq. will moderate a panel focusing on business concerns targeted especially at company leaders responsible for security policy. - March 05, 2015 - Marriah Media, LLC
"See Inside the Mind of a Hacker" Seminar Set for March 26, 2015
Internet Security Seminar for Business Owners, CIOs & IT Directors Set for March 26, 2015 in Lakewood Ranch, Florida - March 05, 2015 - MapleTronics Computers
PandaLabs Neutralized 75 Million New Malware Samples in 2014, Twice as Many as in 2013
34% of all malware ever created was released in 2014, an average of 200,000 new malware strains per day. The global infection rate in 2014 was 30.42% - UK infection rate of 22.14%. - March 04, 2015 - Panda Security
Adcap Network Systems, Inc. Named to Managed Service Provider 500 List by CRN
Adcap Network Systems, Inc., Passionate, Professional, Proven, today announced it has earned recognition on The Channel Company’s 2015 CRN Managed Service Provider (MSP) 500 list as one of the MSP Elite 150. This annual list distinguishes the top technology providers and consultants in North... - March 03, 2015 - Adcap
Tachyon Delivers Zero Touch Mobile Device Configuration and Deployment with Samsung Bulk Enrollment Program
Kaprica Security Inc., experts in mobility and security, announced the release of the latest version of Tachyon™, their mobile device configuration and deployment solution. This new release includes support for Samsung’s new Bulk Enrollment Program (BEP). Kaprica is demonstrating... - March 02, 2015 - Kaprica Security Inc.
Versatile Security Releases vSEC:CMS K2.0
Versatile Security announces the release of vSEC:CMS K-Series version 2.0. Their most popular smart card tool ever - just got even better. - March 02, 2015 - Versasec AB
Omlis Warns Mobile Payments Security Used by Most Financial Institutions is Subpar
According to mobile payments security experts Omlis, financial institutions in Western Europe are taking huge risks by employing poor methods and relying on outdated banking infrastructures to secure sensitive consumer information for mobile transactions. Omlis argues that financial institutions... - February 27, 2015 - Omlis
Introducing Karsof Systems LLCTM Real-Time Transaction Authentication System Using Biometric Technology
Attention banks and other financial institutions! Introducing Karsof Systems LLC (TM) Real-time Transaction Authentication System using Biometric Technology. How would you like to totally protect your bank/institution and all your customers from fraudulent remote transactions? - February 25, 2015 - Karsof Systems LLC of Houston, TX and California
Osterman Research Finds Most Organizations at Significant Risk from Use of Consumer File Sync and Share Tools
Most organizations allow the use of consumer file sync and share tools, putting them at significant risk of data loss. - February 24, 2015 - Osterman Research, Inc.
LifeSpan Receives OSHA SHARP Award in Denver
Second Location to Receive this Health & Safety Recognition - February 24, 2015 - LifeSpan
Hostirian Now Offering SSAE 16 Compliant Hosting
Hostirian, a St. Louis Hosting and Managed Services company is now offering SSAE 16 compliant hosting and colocation services. The SSAE 16 compliance audit reviewed and tested in-depth controls over the information technology and security used by Hostirian to deliver hosting products to their... - February 23, 2015 - Hostirian Business IT Solutions
Cyber Security Web Site Dedicated to C-Suite and Business Personnel Launches
TheCyberSecurityPlace.Com announces the availability of a web site dedicated to disseminating important cyber security issues facing C-Suite and Business personnel. - February 22, 2015 - The Cyber Security Place
The Average Face of a Hacker is Revealed by the Team at Secure Thoughts
The cybersecurity website Secure Thoughts created an animated GIF that morphs 50 of the most notorious hackers in the world into one person. - February 18, 2015 - Secure Thoughts
Karsof Systems' of Houston, TX Biometric Technology Works with Identification and Private Companies to Serve as the Future of Exact Identification
Businesses need an accurate identification system. Karsof Systems of Houston, TX and California now offers the highest level of individual biometric identification available with their patented biometric security solutions. - February 13, 2015 - Karsof Systems LLC of Houston, TX and California
Information Security Media Group Announces Second Diamond Media Sponsorship with the RSA Conference
Information Security Media Group (ISMG) announces it has been selected as the only Diamond Media Sponsor of RSA Conference 2015. This is the ninth year that ISMG has sponsored the RSA Conference, and its second as Diamond Media Sponsor. This partnership at the conference highlights the level of interest and response the ISMG audience has for the event. - February 12, 2015 - Information Security Media Group
Brian Edelman Spoke on CyberSecurity
Brian Edelman spoke on Cybersecurity at a Conference Sponsored by TD Institutional - February 11, 2015 - Financial Computer
IEEE GLOBECOM 2015 to Hold 58th Annual Conference from December 6 – 10 in San Diego, California
“Call for Papers” Ends April 1 for Original Submissions Dedicated to Innovations & Breakthroughs in Next Generation Communications Technologies - February 05, 2015 - IEEE Communications Society
Four New Services Guarantee Reliability and Maximize Efficiency for Contact Center Management
Four new services are available from M&C - focused to increase efficiency, reliability, and further automate contact centers and IVR platforms, while ensuring optimum productivity. Never before has there been such offerings all at once for services designed specifically around allowing Contact Center management to make greater use of their existing Contact Center and IVR platforms. - February 04, 2015 - M&C Associates LLC
Panda Security Announces New Growth Strategy and Identity Change #PandaSimplexity
The company’s internal and external transformation process has resulted in the birth of a new Panda based on the concept of “simplexity.” Panda’s rebranding initiative signals the beginning of an ambitious five-year growth plan. - February 01, 2015 - Panda Security
ZeroFOX Acquires Vulnr
ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr ZeroFOX, The Social Risk Management Company, announced today its acquisition of Vulnr, a stealth-mode security technology company. The company also announced that Vulnr’s founder, Mike Price, has joined... - January 30, 2015 - ZeroFOX
Kaprica Releases Tachyon App for Automatic Samsung Device Configuration and Deployment
Kaprica Security™ Inc., a thought leader in enterprise cyber security, mobility and cloud software, today released its Tachyon™ v1.0 configuration and deployment software for Samsung mobile devices. - January 29, 2015 - Kaprica Security Inc.
Secure Islands Opens U.S. Headquarters; Taps Top Software Executive Paul Gabrik as Executive Vice President of Sales
Innovative Information Protection Company Ramps to Meet Global Demand for its Disruptive Approach to Information Protection: Data Immunization - January 24, 2015 - Secure Islands - Data Security Solutions