Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
ISMG Wraps Up Coverage from RSA Conference 2014
Information Security Media Group (ISMG), Diamond Media Sponsor at RSA Conference 2014, announces its wrap-up of extensive coverage from this year's event. - March 07, 2014 - Information Security Media Group
DataRecovery.com Warns Bitcoin Users to Back Up Their Wallets
DataRecovery.com, a world leader in data recovery, warns Bitcoin users to regularly back up their wallets in order to prevent permanent losses. - March 05, 2014 - Datarecovery.com, Inc.
Solving Bitcoin's Core Issues with The Coin Tree (www.TheCoinTree.com)
The Coin Tree's CEO, Andrew Durgee, discusses solving Bitcoin's core issues of access, security, storage, and distribution. - March 04, 2014 - The Coin Tree
New England Network Solutions Named to CRN’s Managed Service Provider 500 List
Company Recognized for Forward-Thinking Approach to Meeting the Needs of Today’s IT Channel New England Network Solutions, IT Leadership and Services, today announced it has been named to CRN’s Managed Service Provider (MSP) 500 list as one of the MSP Pioneer 250. The annual list... - March 03, 2014 - New England Network Solutions
ECKey Goes Live with VIZpin Cloud-Based Visitor/Access Control
VIZpin Visitor/Access Control Reduces Cost over Traditional Access Control - February 28, 2014 - ECKey Corporation
ALi Broadcast to Broadband Gateway Chipset Integrates iWedia SAT/TER>IP Server Software
ALi Corporation today announced that iWedia, a leading provider of software solutions for TV devices, is providing its latest SAT/TER>IP server software on ALi’s chipsets for broadcast to broadband gateways. - February 27, 2014 - ALi Corporation
NYC Security Camera Installation Experts 360 Protection Protecting Landlords Against Legal Claims
Trusted NYC-based specialists for a unique range of security camera installation services in Washington Heights, Harlem and the Upper West Side, 360 Protection are now working with apartment landlords across the region to install the latest high-tech security camera systems. - February 26, 2014 - 360 Protection
SAI Technology Announces Complete Software Platforms for LTE/LTE-A Mobile eNB Base Stations, Virtual EPC and Security Infrastructure
Mobile World Congress, Barcelona – SAI Technology, Inc., a leading LTE, Wi-Fi, Mobile SDN and Cloud RAN technologies company, today announced availability of its LTE Advanced Software solutions (PHY Layer L1, L2 & L3) running on LSI® Axxia® 5500 network communication processors. - February 23, 2014 - SAI Technology, Inc
Don't Get in a Flap About Android SMS Malware on Google Play Store - Panda Mobile Security Identifies Premium Cost Apps
Between 300,000 and 1,200,000 users may be affected by premium-SMS sending apps downloaded from Google Play. Panda Mobile Security's “Privacy Auditor” feature can spot these. - February 19, 2014 - Panda Security
Simon Moffatt Named ISSA Senior Member
ISSA announced today that Simon Moffatt has been named a Senior Member by the Information Systems Security Association (ISSA). ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk, and protecting critical... - February 15, 2014 - Simon Moffatt
Mobile Pay, Inc. Revolutionizing Payment Processing
Mobile Pay, Inc. Implements New Security Technology for Mobile, Virtual, Cloud Based & Traditional Payment Processing - February 13, 2014 - Mobile Pay, Inc.
IDTELi Partners with Zemana Technologies to Offer AntiLogger Anti-Keylogger to Hardware Store Clients Helping to Fill Gaps in ID Theft Protection
IDTELi researched the global marketplace and found Zemana’s AntiLogger offers a variety of critical protections beyond keystroke encryption thus making it superior to all other similar software solutions currently available. - February 12, 2014 - IDTELi, LLC
New Technology Prevents Social Media Blunders: SecureMySocial Warns Users in Real Time if They Make Inappropriate Posts
SecureMySocial today announced its revolutionary technology that warns users of social media in real-time if they post problematic material that can harm themselves or the businesses for which they work. The system allows businesses to protect themselves from reputational harm, data leaks, legal problems, and other damage, without having to monitor their employees, and without employees needing to share any account information or passwords. - February 11, 2014 - SecureMySocial
Limited Time Offer: Security Company Thirtyseven4 Releases Educational Tablet Security Program
Advanced Tablet Security protection available at no cost to K12 schools, colleges and universities. Security suite includes Malware detection and removal, content filtering, data theft protection and more. - February 10, 2014 - Thirtyseven4, LLC
ISMG Announces 2014 Targeted Attacks Study Survey Results Webinar
Information Security Media Group (ISMG), publisher of BankInfoSecurity, today announces the launch of its latest webinar, "2014 Targeted Attacks Study Survey Results" which will debut February 20th at 1:30 p.m. ET. Most organizations are doing the right things when it comes to preparing... - February 09, 2014 - Information Security Media Group
Versatile Security and CINOVASI Announce Partnership
Versatile Security and CINOVASI announce a partnership that opens up a totally new market for vSEC:CMS -the innovative smart card lifecycle system from Versatile Security. - February 07, 2014 - Versasec AB
NYC-Based 360 Protection Empower Business Success Through Data Wiring Services
New York City-based 360 Protection is now helping local area companies improve their back-end systems performance through a suite of new data wiring services. - February 07, 2014 - 360 Protection
A Forum to Go for Cyber Security and Supply Chain Risk Discussion - Interos Solutions Launches Blog
Interos Solutions (Interos) has launched a blog focused on global cyber and supply chain risks for Governments as well as the private sector – best practices and approaches will be covered, as well as reactions to global current events. - February 05, 2014 - Interos Solutions
TraqCloud Officially Launches via KickStarter.com
Today TraqCloudTM officially launches via Kickstarter.com to enable inexpensive GPS Tracking for the masses. At $19 via Kickstarter, the TraqCloud Device and Cloud Service is the least expensive system out there. TraqCloud believes that personal safety, accountability and the security of assets is... - February 04, 2014 - TraqCloud
Organization of Legal Professionals Expands to South Carolina by Welcoming New Chapter in Columbia
Organization of Legal Professionals welcomes new South Carolina chapter. OLP provides eDiscovery certifications and legal technology to attorneys, litigation support professionals and paralegals. The association has members in 10 countries. - January 31, 2014 - Organization of Legal Professionals
Bloombase Joins EMC Technology Partner Program and is Interoperable with EMC VNX, Atmos and NetWorker
Bloombase today announced enhanced interoperability between Bloombase StoreSafe and EMC® VNX® unified storage platform, Atmos® cloud storage platform, and NetWorker® backup and recovery software, as part of their participation in EMC’s Technology Partner Program. - January 31, 2014 - Bloombase, Inc.
Bloombase Joins the VMware Technology Alliance Partner Program
Bloombase, a Next-Generation Data Security company from Physical, Virtual Data Centers through Big Data, and to the Cloud, today announced it has joined the VMware Technology Alliance Partner (TAP) program. - January 31, 2014 - Bloombase, Inc.
Bloombase Achieves Dell Technology Partner Certification for Next Generation Data At-Rest Encryption Security
Bloombase today announced that it has been officially recognized as a certified Dell Technology Partner and becomes one of the first Dell Technology Partners in the data governance solution space to offer encryption security solutions certified with Dell storage. - January 31, 2014 - Bloombase, Inc.
NTS Recognised as Top Performing Partner 2013 by Egress Software Technologies
Market-leading email and file encryption vendor awards Top Performing Partner to NTS. - January 29, 2014 - Egress Software Technologies Ltd
North Yorkshire County Council Replaces Existing Email Encryption Solution with Egress Switch
North Yorkshire County Council chooses award-winning email and file encryption solution to share confidential information with third parties. - January 25, 2014 - Egress Software Technologies Ltd
BankInfoSecurity and CUInfoSecurity Announce 2014 Influencers
BankInfoSecurity and CUInfoSecurity announce the publication of their 2014 list of Influencers. Published by Information Security Media Group (ISMG), BankInfoSecurity and CUInfoSecurity's list acknowledges individuals and organizations that are playing critical roles in shaping the way financial services organizations approach information security and privacy. - January 24, 2014 - Information Security Media Group
Cloud Provider Launches Hosted Email Exchange Service
Cloud Hosting provider, drive2go launches outlook2go, a hosted Microsoft Exchange email service for businesses that rely on mobile workforces and BYOD environments. - January 23, 2014 - d2 Business Solutions
DataRecovery.com Surpasses Strict Cleanroom Standards
DataRecovery.com, a world leader in professional data recovery services, met and exceeded the requirements for Class 100 cleanroom certification in recent tests carried out at the company's laboratory in St. Louis. Cleanrooms are a critically important tool in the data recovery process. When... - January 23, 2014 - Datarecovery.com, Inc.
Safe – T Named Finalist in Info Security Products Guide’s Global Excellence Awards
Winners Will be Honored in San Francisco on February 24, 2014 during the annual awards dinner and presentation. - January 23, 2014 - Safe-T
Popular Detection and Disinfection Tool Panda Cloud Cleaner Incorporated Into Panda Cloud Systems Management
Using PCSM IT admin can roll-out Panda Cloud Cleaner, Panda Security’s new malware detection and disinfection tool, across the whole network. - January 23, 2014 - Panda Security
HealthcareInfoSecurity Announces 2014 Influencers
HealthcareInfoSecurity announces the publication of its 2014 list of Influencers. Published by Information Security Media Group (ISMG), HealthcareInfoSecurity's second annual list recognizes leaders who are playing a critical role in shaping the way healthcare organizations approach information... - January 22, 2014 - Information Security Media Group
Guy’s and St Thomas’ NHS Foundation Trust Adopts Egress Switch
London-based NHS trust selects market-leading email and file encryption solution to securely share highly sensitive information outside of NHS networks. - January 18, 2014 - Egress Software Technologies Ltd
GovInfoSecurity Announces 2014 Influencers
GovInfoSecurity announces the publication of its 2014 list of Influencers. Published by Information Security Media Group (ISMG), GovInfoSecurity's fifth annual list recognizes the leaders who play a critical role in shaping the way governments approach information security and privacy. - January 17, 2014 - Information Security Media Group
Article Published About Trojan Horse Security by the Daily Mail. TrojanHorseSecurity.com is a comprehensive Information | Cyber Security Firm.
"Cyber Crime A day in the life of a professional hacker: How IT spies masquerading as employees are paid to test company security (aided by ex-CIA, FBI and Delta Force operatives)" http://www.dailymail.co.uk/sciencetech/article-2505779/Cyber-crime-A-day-life-professional-hacker.html - January 16, 2014 - Trojan Horse Security
CareersInfoSecurity Announces 2014 Influencers
CareersInfoSecurity announces the publication of its inaugural 2014 list of Influencers in information security careers. Published by Information Security Media Group (ISMG), CareersInfoSecurity recognizes 10 individuals who shape how organizations and leaders approach information security careers. - January 16, 2014 - Information Security Media Group
CipherPoint Partners with DocPoint Solutions to Provide Data Encryption Software to Government and Enterprise Organizations
Reseller relationship enables integrator to offer best-in-class data encryption software to enhance the security of the Microsoft SharePoint environment. - January 15, 2014 - CipherPoint Software, Inc.
Fast-Growing Financial Services Provider Selects Award-Winning Email and File Encryption Solution to Secure Confidential Data
Sunday Times Top 100 Company to Work For Think Money Group protects highly sensitive information using Egress Switch when communicating with third parties, such as banks, partners and customers. - January 11, 2014 - Egress Software Technologies Ltd
IEEE GLOBECOM 2013: Exploring the Power of Global Communications at 56th Annual International Event Held in Atlanta, Georgia
IEEE GLOBECOM 2013, the premier international conference dedicated to the advance of the entire array of global communications, highlighted its 56th annual conference in Atlanta, Georgia with the presentation of more than 1,500 technical papers, keynotes, business panels and industry forums... - January 10, 2014 - IEEE Communications Society
Lori Chang, Attorney, Greenberg Traurig LLP to Speak at KC’s Privacy and Security Concerns: The Bring Your Own Device Policy Live Webcast
The Knowledge Group/The Knowledge Congress Live Webcast Series, the leading producer of regulatory focused webcasts, has announced today that Lori Chang, Attorney, Greenberg Traurig LLP will speak at the Knowledge Congress’ webcast entitled: “Privacy and Security Concerns: The Bring... - January 04, 2014 - The Knowledge Group
Vysion Technology Solutions Recommends Top Five IT Security Priorities for Business Owners in 2014
Vysion Tech, Provider of Affordable MSP Solutions to Small and Medium-Sized Businesses, Suggests What Needs Most Attention in the New Year. - January 02, 2014 - VysionTech
Announcing the Third Annual Healthcare Information Security Today Survey
Information Security Media Group (ISMG), publisher of HealthcareInfoSecurity, announces its third annual Healthcare Information Security Today survey, which measures progress toward ensuring the privacy and security of healthcare information, as well as compliance with the HIPAA Omnibus Rule. This... - January 02, 2014 - Information Security Media Group
DataRecovery.com Warns That SSD Does Not Provide Perfect Protection
Datarecovery.com, a world leader in professional hard drive data recovery, warns that solid-state drives do not provide complete protection against data loss. In recent years, many personal computer users have moved from hard drives to solid-state drives in order to benefit from the new... - December 31, 2013 - Datarecovery.com, Inc.
MarbleHost.com Introduces a New Generation of the Shared Web Hosting Security
MarbleHost.com, a web hosting company with data centers in USA, United Kingdom and Australia, introduces new generation of the shared web hosting security. To avoid brute force attacks, DDoS attacks and prevent situations when websites with security holes are hacked, MarbleHost.com now offers to... - December 28, 2013 - MarbleHost
OutDisk FTP Add-on for Microsoft Office Outlook Helps Companies Deliver and Control Email File Attachments to Recipients
Firewalls and inbox size restrictions have made it more difficult than ever to share files as attachments to email messages. While file sharing services exist, they are often not the best choice due to concerns about HIPAA regulations, and questions about privacy, snooping, and data retention policies that remain beyond the sender's control. OutDisk helps companies build their own inhouse system for managing email file attachments. - December 27, 2013 - Encryptomatic LLC
Amac Software Announces New Year 50% Discount Offer for Amac Keylogger for Mac OS X
Amac Keylogger for Mac, which records keystrokes, passwords, websites, IM chats, takes screenshots and sends logs to email, now is on 50%-off special sale. - December 26, 2013 - Amac Software
ISMG Announces Launch of 2014 Targeted Attacks Study
Information Security Media Group (ISMG) announces the launch of the 2014 Targeted Attacks Study. This survey, sponsored by Proofpoint, aims to determine the extent of damage caused by targeted attacks, where organizations are most and least prepared to mitigate advanced threats, and the top technology investments for 2014. - December 22, 2013 - Information Security Media Group
Information Security Media Group Releases 2014 Media Kit, Editorial Calendars
Information Security Media Group (ISMG) announces the release of its Media Kit and Editorial Calendars for 2014. The year 2013 brought unprecedented levels of growth across ISMG, publisher of BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, DataBreachToday, InfoRiskToday... - December 22, 2013 - Information Security Media Group
Mikael Ramnö Appointed to the Versatile Security Board
Mikael Ramnö has been appointed to the Versatile Security Board of Directors and jump starts projects in the area of business development and partner relationships from day 1. - December 22, 2013 - Versasec AB
iOS & Android Mobile Device Management with Panda Security
Panda Cloud Systems Management allows management of laptops, smartphones and tablets, preventing loss of confidential information in the event of loss or theft of a mobile device. - December 21, 2013 - Panda Security
Thursby Delivers iPad Mini Secure Mobility CAC/PIV Sled Bundle for Christmas
Thursby Software, the market leader in enterprise Apple integration, security and management, announced the immediate availability of its new PKard® Reader secure mobility sled bundle for the iPad mini. The bundle includes Thursby’s elegant and discrete CAC/PIV one-piece case and built-in smart card reader, or sled, for the iPad mini, along with the PKard Reader secure browser app, phone and email technical support. - December 17, 2013 - Thursby Software Systems, Inc.