Computer Security News

Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.

ISMG Wraps Up Coverage from RSA Conference 2014

Information Security Media Group (ISMG), Diamond Media Sponsor at RSA Conference 2014, announces its wrap-up of extensive coverage from this year's event. - March 07, 2014 - Information Security Media Group

DataRecovery.com Warns Bitcoin Users to Back Up Their Wallets

DataRecovery.com Warns Bitcoin Users to Back Up Their Wallets

DataRecovery.com, a world leader in data recovery, warns Bitcoin users to regularly back up their wallets in order to prevent permanent losses. - March 05, 2014 - Datarecovery.com, Inc.

Solving Bitcoin's Core Issues with The Coin Tree (www.TheCoinTree.com)

The Coin Tree's CEO, Andrew Durgee, discusses solving Bitcoin's core issues of access, security, storage, and distribution. - March 04, 2014 - The Coin Tree

New England Network Solutions Named to CRN’s Managed Service Provider 500 List

Company Recognized for Forward-Thinking Approach to Meeting the Needs of Today’s IT Channel New England Network Solutions, IT Leadership and Services, today announced it has been named to CRN’s Managed Service Provider (MSP) 500 list as one of the MSP Pioneer 250. The annual list... - March 03, 2014 - New England Network Solutions

ECKey Goes Live with VIZpin Cloud-Based Visitor/Access Control

VIZpin Visitor/Access Control Reduces Cost over Traditional Access Control - February 28, 2014 - ECKey Corporation

ALi Broadcast to Broadband Gateway Chipset Integrates iWedia SAT/TER>IP Server Software

ALi Corporation today announced that iWedia, a leading provider of software solutions for TV devices, is providing its latest SAT/TER>IP server software on ALi’s chipsets for broadcast to broadband gateways. - February 27, 2014 - ALi Corporation

NYC Security Camera Installation Experts 360 Protection Protecting Landlords Against Legal Claims

Trusted NYC-based specialists for a unique range of security camera installation services in Washington Heights, Harlem and the Upper West Side, 360 Protection are now working with apartment landlords across the region to install the latest high-tech security camera systems. - February 26, 2014 - 360 Protection

SAI Technology Announces Complete Software Platforms for LTE/LTE-A Mobile eNB Base Stations, Virtual EPC and Security Infrastructure

SAI Technology Announces Complete Software Platforms for LTE/LTE-A Mobile eNB Base Stations, Virtual EPC and Security Infrastructure

Mobile World Congress, Barcelona – SAI Technology, Inc., a leading LTE, Wi-Fi, Mobile SDN and Cloud RAN technologies company, today announced availability of its LTE Advanced Software solutions (PHY Layer L1, L2 & L3) running on LSI® Axxia® 5500 network communication processors. - February 23, 2014 - SAI Technology, Inc

Don't Get in a Flap About Android SMS Malware on Google Play Store - Panda Mobile Security Identifies Premium Cost Apps

Between 300,000 and 1,200,000 users may be affected by premium-SMS sending apps downloaded from Google Play. Panda Mobile Security's “Privacy Auditor” feature can spot these. - February 19, 2014 - Panda Security

Simon Moffatt Named ISSA Senior Member

ISSA announced today that Simon Moffatt has been named a Senior Member by the Information Systems Security Association (ISSA). ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk, and protecting critical... - February 15, 2014 - Simon Moffatt

Mobile Pay, Inc. Revolutionizing Payment Processing

Mobile Pay, Inc. Implements New Security Technology for Mobile, Virtual, Cloud Based & Traditional Payment Processing - February 13, 2014 - Mobile Pay, Inc.

IDTELi Partners with Zemana Technologies to Offer AntiLogger Anti-Keylogger to Hardware Store Clients Helping to Fill Gaps in ID Theft Protection

IDTELi researched the global marketplace and found Zemana’s AntiLogger offers a variety of critical protections beyond keystroke encryption thus making it superior to all other similar software solutions currently available. - February 12, 2014 - IDTELi, LLC

New Technology Prevents Social Media Blunders: SecureMySocial Warns Users in Real Time if They Make Inappropriate Posts

New Technology Prevents Social Media Blunders: SecureMySocial Warns Users in Real Time if They Make Inappropriate Posts

SecureMySocial today announced its revolutionary technology that warns users of social media in real-time if they post problematic material that can harm themselves or the businesses for which they work. The system allows businesses to protect themselves from reputational harm, data leaks, legal problems, and other damage, without having to monitor their employees, and without employees needing to share any account information or passwords. - February 11, 2014 - SecureMySocial

Limited Time Offer:  Security Company Thirtyseven4 Releases Educational Tablet Security Program

Limited Time Offer: Security Company Thirtyseven4 Releases Educational Tablet Security Program

Advanced Tablet Security protection available at no cost to K12 schools, colleges and universities. Security suite includes Malware detection and removal, content filtering, data theft protection and more. - February 10, 2014 - Thirtyseven4, LLC

ISMG Announces 2014 Targeted Attacks Study Survey Results Webinar

Information Security Media Group (ISMG), publisher of BankInfoSecurity, today announces the launch of its latest webinar, "2014 Targeted Attacks Study Survey Results" which will debut February 20th at 1:30 p.m. ET. Most organizations are doing the right things when it comes to preparing... - February 09, 2014 - Information Security Media Group

Versatile Security and CINOVASI Announce Partnership

Versatile Security and CINOVASI announce a partnership that opens up a totally new market for vSEC:CMS -the innovative smart card lifecycle system from Versatile Security. - February 07, 2014 - Versasec AB

NYC-Based 360 Protection Empower Business Success Through Data Wiring Services

New York City-based 360 Protection is now helping local area companies improve their back-end systems performance through a suite of new data wiring services. - February 07, 2014 - 360 Protection

A Forum to Go for Cyber Security and Supply Chain Risk Discussion - Interos Solutions Launches Blog

Interos Solutions (Interos) has launched a blog focused on global cyber and supply chain risks for Governments as well as the private sector – best practices and approaches will be covered, as well as reactions to global current events. - February 05, 2014 - Interos Solutions

TraqCloud Officially Launches via KickStarter.com

TraqCloud Officially Launches via KickStarter.com

Today TraqCloudTM officially launches via Kickstarter.com to enable inexpensive GPS Tracking for the masses. At $19 via Kickstarter, the TraqCloud Device and Cloud Service is the least expensive system out there. TraqCloud believes that personal safety, accountability and the security of assets is... - February 04, 2014 - TraqCloud

Organization of Legal Professionals Expands to South Carolina by Welcoming New Chapter in Columbia

Organization of Legal Professionals Expands to South Carolina by Welcoming New Chapter in Columbia

Organization of Legal Professionals welcomes new South Carolina chapter. OLP provides eDiscovery certifications and legal technology to attorneys, litigation support professionals and paralegals. The association has members in 10 countries. - January 31, 2014 - Organization of Legal Professionals

Bloombase Joins EMC Technology Partner Program and is Interoperable with EMC VNX, Atmos and NetWorker

Bloombase today announced enhanced interoperability between Bloombase StoreSafe and EMC® VNX® unified storage platform, Atmos® cloud storage platform, and NetWorker® backup and recovery software, as part of their participation in EMC’s Technology Partner Program. - January 31, 2014 - Bloombase, Inc.

Bloombase Joins the VMware Technology Alliance Partner Program

Bloombase, a Next-Generation Data Security company from Physical, Virtual Data Centers through Big Data, and to the Cloud, today announced it has joined the VMware Technology Alliance Partner (TAP) program. - January 31, 2014 - Bloombase, Inc.

Bloombase Achieves Dell Technology Partner Certification for Next Generation Data At-Rest Encryption Security

Bloombase today announced that it has been officially recognized as a certified Dell Technology Partner and becomes one of the first Dell Technology Partners in the data governance solution space to offer encryption security solutions certified with Dell storage. - January 31, 2014 - Bloombase, Inc.

NTS Recognised as Top Performing Partner 2013 by Egress Software Technologies

Market-leading email and file encryption vendor awards Top Performing Partner to NTS. - January 29, 2014 - Egress Software Technologies Ltd

North Yorkshire County Council Replaces Existing Email Encryption Solution with Egress Switch

North Yorkshire County Council chooses award-winning email and file encryption solution to share confidential information with third parties. - January 25, 2014 - Egress Software Technologies Ltd

BankInfoSecurity and CUInfoSecurity Announce 2014 Influencers

BankInfoSecurity and CUInfoSecurity announce the publication of their 2014 list of Influencers. Published by Information Security Media Group (ISMG), BankInfoSecurity and CUInfoSecurity's list acknowledges individuals and organizations that are playing critical roles in shaping the way financial services organizations approach information security and privacy. - January 24, 2014 - Information Security Media Group

Cloud Provider Launches Hosted Email Exchange Service

Cloud Provider Launches Hosted Email Exchange Service

Cloud Hosting provider, drive2go launches outlook2go, a hosted Microsoft Exchange email service for businesses that rely on mobile workforces and BYOD environments. - January 23, 2014 - d2 Business Solutions

DataRecovery.com Surpasses Strict Cleanroom Standards

DataRecovery.com, a world leader in professional data recovery services, met and exceeded the requirements for Class 100 cleanroom certification in recent tests carried out at the company's laboratory in St. Louis. Cleanrooms are a critically important tool in the data recovery process. When... - January 23, 2014 - Datarecovery.com, Inc.

Safe – T Named Finalist in Info Security Products Guide’s Global Excellence Awards

Winners Will be Honored in San Francisco on February 24, 2014 during the annual awards dinner and presentation. - January 23, 2014 - Safe-T

Popular Detection and Disinfection Tool Panda Cloud Cleaner Incorporated Into Panda Cloud Systems Management

Using PCSM IT admin can roll-out Panda Cloud Cleaner, Panda Security’s new malware detection and disinfection tool, across the whole network. - January 23, 2014 - Panda Security

HealthcareInfoSecurity Announces 2014 Influencers

HealthcareInfoSecurity announces the publication of its 2014 list of Influencers. Published by Information Security Media Group (ISMG), HealthcareInfoSecurity's second annual list recognizes leaders who are playing a critical role in shaping the way healthcare organizations approach information... - January 22, 2014 - Information Security Media Group

Guy’s and St Thomas’ NHS Foundation Trust Adopts Egress Switch

London-based NHS trust selects market-leading email and file encryption solution to securely share highly sensitive information outside of NHS networks. - January 18, 2014 - Egress Software Technologies Ltd

GovInfoSecurity Announces 2014 Influencers

GovInfoSecurity announces the publication of its 2014 list of Influencers. Published by Information Security Media Group (ISMG), GovInfoSecurity's fifth annual list recognizes the leaders who play a critical role in shaping the way governments approach information security and privacy. - January 17, 2014 - Information Security Media Group

Article Published About Trojan Horse Security by the Daily Mail. TrojanHorseSecurity.com is a comprehensive Information | Cyber Security Firm.

"Cyber Crime A day in the life of a professional hacker: How IT spies masquerading as employees are paid to test company security (aided by ex-CIA, FBI and Delta Force operatives)" http://www.dailymail.co.uk/sciencetech/article-2505779/Cyber-crime-A-day-life-professional-hacker.html - January 16, 2014 - Trojan Horse Security

CareersInfoSecurity Announces 2014 Influencers

CareersInfoSecurity announces the publication of its inaugural 2014 list of Influencers in information security careers. Published by Information Security Media Group (ISMG), CareersInfoSecurity recognizes 10 individuals who shape how organizations and leaders approach information security careers. - January 16, 2014 - Information Security Media Group

CipherPoint Partners with DocPoint Solutions to Provide Data Encryption Software to Government and Enterprise Organizations

Reseller relationship enables integrator to offer best-in-class data encryption software to enhance the security of the Microsoft SharePoint environment. - January 15, 2014 - CipherPoint Software, Inc.

Fast-Growing Financial Services Provider Selects Award-Winning Email and File Encryption Solution to Secure Confidential Data

Sunday Times Top 100 Company to Work For Think Money Group protects highly sensitive information using Egress Switch when communicating with third parties, such as banks, partners and customers. - January 11, 2014 - Egress Software Technologies Ltd

IEEE GLOBECOM 2013: Exploring the Power of Global Communications at 56th Annual International Event Held in Atlanta, Georgia

IEEE GLOBECOM 2013, the premier international conference dedicated to the advance of the entire array of global communications, highlighted its 56th annual conference in Atlanta, Georgia with the presentation of more than 1,500 technical papers, keynotes, business panels and industry forums... - January 10, 2014 - IEEE Communications Society

Lori Chang, Attorney, Greenberg Traurig LLP to Speak at KC’s Privacy and Security Concerns: The Bring Your Own Device Policy Live Webcast

The Knowledge Group/The Knowledge Congress Live Webcast Series, the leading producer of regulatory focused webcasts, has announced today that Lori Chang, Attorney, Greenberg Traurig LLP will speak at the Knowledge Congress’ webcast entitled: “Privacy and Security Concerns: The Bring... - January 04, 2014 - The Knowledge Group

Vysion Technology Solutions Recommends Top Five IT Security Priorities for Business Owners in 2014

Vysion Tech, Provider of Affordable MSP Solutions to Small and Medium-Sized Businesses, Suggests What Needs Most Attention in the New Year. - January 02, 2014 - VysionTech

Announcing the Third Annual Healthcare Information Security Today Survey

Information Security Media Group (ISMG), publisher of HealthcareInfoSecurity, announces its third annual Healthcare Information Security Today survey, which measures progress toward ensuring the privacy and security of healthcare information, as well as compliance with the HIPAA Omnibus Rule. This... - January 02, 2014 - Information Security Media Group

DataRecovery.com Warns That SSD Does Not Provide Perfect Protection

Datarecovery.com, a world leader in professional hard drive data recovery, warns that solid-state drives do not provide complete protection against data loss. In recent years, many personal computer users have moved from hard drives to solid-state drives in order to benefit from the new... - December 31, 2013 - Datarecovery.com, Inc.

MarbleHost.com Introduces a New Generation of the Shared Web Hosting Security

MarbleHost.com, a web hosting company with data centers in USA, United Kingdom and Australia, introduces new generation of the shared web hosting security. To avoid brute force attacks, DDoS attacks and prevent situations when websites with security holes are hacked, MarbleHost.com now offers to... - December 28, 2013 - MarbleHost

OutDisk FTP Add-on for Microsoft Office Outlook Helps Companies Deliver and Control Email File Attachments to Recipients

OutDisk FTP Add-on for Microsoft Office Outlook Helps Companies Deliver and Control Email File Attachments to Recipients

Firewalls and inbox size restrictions have made it more difficult than ever to share files as attachments to email messages. While file sharing services exist, they are often not the best choice due to concerns about HIPAA regulations, and questions about privacy, snooping, and data retention policies that remain beyond the sender's control. OutDisk helps companies build their own inhouse system for managing email file attachments. - December 27, 2013 - Encryptomatic LLC

Amac Software Announces New Year 50% Discount Offer for Amac Keylogger for Mac OS X

Amac Software Announces New Year 50% Discount Offer for Amac Keylogger for Mac OS X

Amac Keylogger for Mac, which records keystrokes, passwords, websites, IM chats, takes screenshots and sends logs to email, now is on 50%-off special sale. - December 26, 2013 - Amac Software

ISMG Announces Launch of 2014 Targeted Attacks Study

Information Security Media Group (ISMG) announces the launch of the 2014 Targeted Attacks Study. This survey, sponsored by Proofpoint, aims to determine the extent of damage caused by targeted attacks, where organizations are most and least prepared to mitigate advanced threats, and the top technology investments for 2014. - December 22, 2013 - Information Security Media Group

Information Security Media Group Releases 2014 Media Kit, Editorial Calendars

Information Security Media Group (ISMG) announces the release of its Media Kit and Editorial Calendars for 2014. The year 2013 brought unprecedented levels of growth across ISMG, publisher of BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, DataBreachToday, InfoRiskToday... - December 22, 2013 - Information Security Media Group

Mikael Ramnö Appointed to the Versatile Security Board

Mikael Ramnö has been appointed to the Versatile Security Board of Directors and jump starts projects in the area of business development and partner relationships from day 1. - December 22, 2013 - Versasec AB

iOS & Android Mobile Device Management with Panda Security

Panda Cloud Systems Management allows management of laptops, smartphones and tablets, preventing loss of confidential information in the event of loss or theft of a mobile device. - December 21, 2013 - Panda Security

Thursby Delivers iPad Mini Secure Mobility CAC/PIV Sled Bundle for Christmas

Thursby Delivers iPad Mini Secure Mobility CAC/PIV Sled Bundle for Christmas

Thursby Software, the market leader in enterprise Apple integration, security and management, announced the immediate availability of its new PKard® Reader secure mobility sled bundle for the iPad mini. The bundle includes Thursby’s elegant and discrete CAC/PIV one-piece case and built-in smart card reader, or sled, for the iPad mini, along with the PKard Reader secure browser app, phone and email technical support. - December 17, 2013 - Thursby Software Systems, Inc.

Press Releases 1,801 - 1,850 of 3,335