Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
StrikeForce’s UK Distributor, CDISGroup Ltd., to Launch Large Pilots for Corporate Customers to Prevent Identity Theft and Data Breaches of Their Clients
The Organizations Include: Financial Service Organizations, Retail Shopping Giants and Mortgage Lending Institutions - July 20, 2013 - StrikeForce Technologies, Inc.
Global4PL Announces Major Global Supply Chain Contract Proving Importer of Record / Exporter of Record (IOR-EOR) Services
Global4PL Supply Chain Services, an industry leading supply chain consulting and global trade management company, announced today that an undisclosed Hi-Tech Fortune 500 company has selected Global4PL to provide Importer/Exporter of Record and RMA depot services in Latin America and Asia, including... - July 19, 2013 - Global4PL
Aanval and Emerging Threats Host Webinar on Enhancing Visibility and Protection Against Malware on Suricata & Snort IDS/IPS
Live Webinar Featuring Tactical FLEX, Inc. and Emerging Threats’ Global Marketing and Product Management Director Byron Rashed for a discussion on trends and malware attacks seen in enterprise networks today and solutions to minimize business risks. - July 19, 2013 - Tactical FLEX, Inc.
StrikeForce Signs Agreement with One of Israel’s Leading Homeland Security Distributors
StrikeForce Technologies, Inc. (OTCBB: SFOR) today announced it has signed a distributor agreement with A.R. Challenges, Ltd. one of Israel’s leading Cyber Security distributors, specializing in Homeland Security, Critical Israeli Infrastructure and enterprise security. “StrikeForce is... - July 13, 2013 - StrikeForce Technologies, Inc.
Play Panda Security’s "Space Invaders" on Facebook and Win an iPad Mini
Panda Security launches Facebook game to raise awareness about the importance of a virus-free world. Each week, the highest score will win an iPad Mini. - July 12, 2013 - Panda Security
Fake "Internet Security" Virus Storms Internet, Infecting Thousands
OnlineVirusRepair.com launches new fast and highly effective removal method for users infected with the “Internet Security virus.” - July 12, 2013 - Online Virus Repair Inc.
Megamind Launches Live, Instructor-Led Online 2-Day CISM® Prep Training Class Taught by Security Expert, Krag Brotby, Principal Author ISACA CISM Review Manual
If you're planning to take the CISM® Exam, then this is the training class for you. Megamind's CISM® PREP TRAINING is specifically designed to prepare attendees for the official CISM® Exam. This intensive 2-day training focuses on developing the unique and essential examination skills necessary for success on the CISM EXAM, and helps to avoid the mistakes so many make that often result in failure. Attendees are provided with a set of invaluable tools and approaches to prepare for the CISM Exam. - July 11, 2013 - Megamind Training Institute
Virtualized Encryption Key Management Now Possible with Alliance Key Manager for VMware
Alliance Key Manager for VMware enables enterprises to lower operational costs, meet compliance requirements, deploy key management in the cloud, and accelerate deployment of mission critical security technology through a virtualized encryption key manager. - July 10, 2013 - Townsend Security
ISMG Launches DDoS Resource Center
Information Security Media Group, publisher of BankInfoSecurity and InfoRiskToday, announces the launch of its new Resource Center covering the DDoS attack phenomenon. The site, sponsored by Akamai, Fortinet, Neustar, Radware and VeriSign, is dedicated to providing in-depth news, analysis and insights from ISMG's staff and top mitigation experts on the latest incidents, emerging trends and prevention strategies. - July 10, 2013 - Information Security Media Group
Internet Privacy Supporters to Boost CloudLocker Indiegogo Campaign
Crowdfunding campaign offers new technology to address recent concerns with online privacy and unwanted access to stored data. - July 04, 2013 - StoAmigo
Contego Solutions Partners with Nuix to Bolster Its Digital Forensics Capabilities
Nuix will help Contego Solutions customers find answers fast amongst large and complex evidence sets. - July 03, 2013 - Contego Data Solutions FZ-LLC
Cloud Security Leader Unveils Best Practices to Make Regulatory Compliance Easier
CloudAccess presents new white paper that explores the strategic advantages of applying unified and collaborative security options to cost-effectively and efficiently manage compliance requirements. - July 01, 2013 - CloudAccess
GoldKey Security Kryptors Pass FIPS 140-2 Certification Testing
GoldKey Security Corporation announced the completion of the FIPS 140-2 certification testing requirements for GoldKey Security Kryptors. FIPS 140-2 testing is considered to be one of the most rigorous and stringent certification testing procedures in the industry. It is a mandated requirement by... - June 27, 2013 - GoldKey Security Corporation
Revelations About PRISM Have Businesses Seeking Data Storage Alternatives
Revelations about the once-secret government data collection program known as PRISM, which was exposed as a major source of National Security Agency raw intelligence from 2007-present, have American businesses on edge regarding data security. With privacy concerns reaching an all-time high,... - June 25, 2013 - d2 Business Solutions
Apriorit Adapts Nanomites for Linux: Modern Antidebug Protection
This month, Apriorit company releases the new technology of Linux application protection from illegal debug, dumping, and reversing based on the so-called nanomites. Modern and efficient, the nanomite technology is successfully used in the commercial protectors for Windows systems. Apriorit Linux Code Protection SDK is the first product to provide an improved nanomite protection for Linux applications. - June 24, 2013 - Apriorit
StrikeForce Signs Agreement with One of Europe’s Leading Cyber Security Distributors - with Access to Over 100,000 Independent Resellers
Commences Major Campaign Launch in 13 Countries for GuardedID’s Anti-Keylogging Keystroke Encryption Technology - June 23, 2013 - StrikeForce Technologies, Inc.
ISMG Announces 2013 Mobile Security Survey Results Webinar
Information Security Media Group (ISMG), publisher of BankInfoSecurity, today announces the launch of its latest webinar, "Beyond BYOD: 2013 Mobile Security Survey Results," which will debut June 25 at 3:30 p.m. ET. At a time of unprecedented mobile device adoption - and evolving mobile... - June 23, 2013 - Information Security Media Group
CloudAccess, IdentityForge Collaborate to Expand Identity Management from the Cloud
Partnership to combine development and distribution of new user account control and security connectors for applications. - June 21, 2013 - CloudAccess
NovaStor Partners Take Note of Sales Growth Following Backup Certification
Through better understanding and positioning of backup & restore products, IT resellers find new opportunities to generate revenue by protecting customer data. - June 21, 2013 - NovaStor
Virus Protection and Content Security Solution from BowBridge Achieves SAP Certification
As the first vendor, BowBridge supports SAPs new content security interface – also on SAP HANA. - June 19, 2013 - BowBridge Software
Security Enterprise Introduces Quantum Advance in Credit Card Fraud and Identity Theft Prevention
GarbleCard ™ unveils new patent pending technology for defeating rampant RFID skimming. - June 19, 2013 - Garble LLC
Syncdocs Encrypts Google Drive Data for Extra Security
New App Secures Google Data from Spying - June 19, 2013 - Syncdocs
ISMG Announces the 2013 Bit9 Cybersecurity Study
Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of the 2013 Bit9 Cybersecurity Study, which will help determine the impact of today's advanced cyber attacks, where organizations are least prepared to detect and prevent advanced cyber attacks, and cyber attack defense spending priorities for 2014. - June 16, 2013 - Information Security Media Group
Panda Cloud Antivirus 2.2 Adds Data Shield, Parental Control and Rescue Boot creator
Version 2.2 includes the features most frequently requested by the Panda Cloud Antivirus user community, as well as a special area for the most advanced users. Panda Cloud Antivirus 2.2 has a Community Labs area, to deliver new, free tools to the user community. - June 16, 2013 - Panda Security
Marathon IT Services & Varonis Scale the Information Mountain Together
Showing customers how to handle extreme data at the aiim Roadshow, 20 June 2013, ILEC, London - June 15, 2013 - Marathon IT Services
Bluewolf and FinancialForce Announce Global Partnership
FinancialForce and Bluewolf announced strategic global partnership to help companies challenged to consolidate information across disparate customer relationship management (CRM), back office and supply chain applications using joint cloud-based applications and services. - June 14, 2013 - FinancialForce.com
ISMG Announces the 2013 Faces of Fraud Survey: The Threat Evolution
Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of its 2013 Faces of Fraud survey. A follow-up to ISMG's 2010 and 2011 Faces of Fraud surveys, this new research, sponsored by Easy Solutions, looks not only at the latest fraud trends and how institutions... - June 12, 2013 - Information Security Media Group
Panda Cloud Antivirus Free Achieves Third Consecutive Virus Bulletin VB100 Certification
Panda Cloud Antivirus Free is one of the least resource-intensive solutions according to the prestigious testing antivirus authority where Panda Cloud Antivirus has received 100 percent of all certifications since taking part in Virus Bulletin’s reviews. - June 08, 2013 - Panda Security
High-Tech Bride Named a Top Trusted Website in OTA’s 2013 Online Trust Honor Roll
High-Tech Bridge SA announced it has been named to the Online Trust Alliance (OTA) 2013 Online Trust Honor Roll for demonstrating exceptional data protection, privacy and security in an effort to better protect their customers and brand. For High-Tech Bridge this is a second consecutive nomination... - June 05, 2013 - High-Tech Bridge SA
Fixico Launches Consumer 24/7 Computer Support Based on Proven Enterprise IT Technology
Free, easy to use service, keeps computers fast, secure and worry-free, saving consumers time and money. - June 05, 2013 - Fixico
Recovery Software Updates RS File Recovery, Adding Pre-Recovery Preview for Multiple Formats
Recovery Software updates RS File Recovery, the company’s easiest to use undelete solution. Version 3.3 brings pre-recovery preview support for a number of additional formats including documents and spreadsheets in Microsoft Office 2013 format, certain compressed archives, as well as certain types of video and audio files. - June 03, 2013 - Recovery Software
Egress Forms Strategic Partnership with Data Regulation and Compliance Experts Regulatory Strategies
Egress Software Technologies partners with leading information security consultancy to help organisations mitigate information security risks and maximise compliance. - June 01, 2013 - Egress Software Technologies Ltd
NetAbstraction and Light Point Security Have Signed a Partnership Agreement to Offer Virtualization and Cloud Technologies to Protect Customer’s Online Activity
NetAbstraction combines their next-generation secure network with Light Point Security’s first and only server-based virtual-machine-in-a-browser. - May 30, 2013 - Light Point Security
Leading Environmental Services Organisation SDK Adopts Egress Switch to Secure Data Shared with External Partners and Remain Compliant with the DPA
Local Authority outsourcing service provider recognises the importance of secure communication as part of its client services responsibility by implementing leading email and file encryption solution. - May 23, 2013 - Egress Software Technologies Ltd
Hundreds of Leading Global Experts to Address Latest Advances in Voice, Data, Image & Multimedia Technologies at IEEE ICC 2013
Five-Day International Event to be held June 9 - 13 in Budapest, Hungary Expands Agenda to Include Nearly 1,500 Presentations Dedicated to Wireless and Wireline Communications - May 22, 2013 - IEEE Communications Society
Incident Response Survey: Organizations Ill-Prepared for Advanced Threats
Under the shadow of advanced cyber threats, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced persistent threats. These are among the main... - May 22, 2013 - Information Security Media Group
96% of People Share Confidential Data with Third Parties, Regardless of Whether the Necessary Security is in Place to Protect the Information
Egress Software Technologies’ latest information security survey reveals that the business won’t be denied when it comes to sharing sensitive data – whatever the risk. - May 16, 2013 - Egress Software Technologies Ltd
Westinghouse Lighting Avoids $50,000 Backup Appliance Cost with Zetta.net Backup and Recovery for SQL and Hyper-V Server Backup
Leading Lighting Manufacturer Replaces Symantec Backup Exec with Zetta.net to Overcome the Challenges of Tape Backup - May 16, 2013 - Zetta.net
Cloud Backup is Only the Beginning
NTI Launches Cloud-Supported NTI Backup Now EZ™ 3 with Special Promotion - May 15, 2013 - NTI Corporation
Revealing Cloud-Driven Best Practices for Fully Integrated Identity and Access Management
CloudAccess is hosting a free webinar titled: "One Click...From Directory to Cloud" on May 22 and May 28th at 11:00am to address best practices associated with user provisioning, password management, multi-factor authentication, application gateways and single sign on. - May 11, 2013 - CloudAccess
Don’t Become an Unwitting "Money Mule," Warns Information Security Firm
Information security firm commissum issues a warning to the public about the risk of becoming a “money mule,” unwittingly working for cyber-thieves. - May 10, 2013 - commissum
Microsoft System Center Data Protection Manager 2012 Book Set to Release June 2013
In the DPM 2012 book you will gain insight from Microsoft MVP's into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. - May 08, 2013 - Buchatech
BluePrint Data Offers Internet Security Vendors a Competitive Switch Program for Its OEM Internet Content Filtering and Malware Prevention Services
Competitive Switch Program. Internet Security Vendors that use content filter databases or URL filter lists, and / or URL Malware protection services can receive a discount of 25% from what they are currently paying for similar services. - May 05, 2013 - BluePrint Data
ISMG Launches HIPAA Omnibus Resource Center
Information Security Media Group, publisher of HealthcareInfoSecurity, announces the launch of its new Resource Center on the HIPAA Omnibus Rule. The microsite, sponsored by Experian Data Breach Resolution, is dedicated to providing in-depth news and analysis on the recently enacted... - May 05, 2013 - Information Security Media Group
Emsisoft is Teaming Up with Surfright Hitman Pro: Buy Emsisoft Anti-Malware and Get Sufright Hitman Pro Free
Multi-Visions Canada Inc. North America’s exclusive distributors of Emsisoft’s Anti-Malware solution is offering a Crazy May promotion. Buy a 3 user Anti-malware license for the price of 1 and receive a 3 user 1 year Sufright Hitman Pro License absolutely free. This offer will continue... - May 04, 2013 - Multi-Visions
SmartOffice and Vaultize Partner to Deliver Secure Office in Vaultize Enterprise File Sharing Platform
SmartOffice Technologies Limited, the leading provider of secure office solutions for enterprise, is pleased to announce a technology Partnership with Vaultize bringing secure mobile office to their enterprise file sharing solution. SmartOffice’s wholly owned technology, developed over the... - May 04, 2013 - Anoosmar Technologies
Popular LightLogger Keylogger by HeavenWard Now Supports Windows 8
PC users running Windows 8 can now enjoy all the keylogging features of LightLogger, the popular computer monitor by security software company HeavenWard. - May 02, 2013 - HeavenWard
Panda Bolsters Cloud Antivirus with URL Filtering
New Panda Cloud Office Protection 6.5 helps companies monitor and control users’ browsing habits. Supports Exchange 2013 and popular Linux distributions. Improved zero-day vulnerabilities anti-exploit technologies. - May 02, 2013 - Panda Security
CloudAccess Unveils Integrated Version of Identity and Access Management
Security-as-a-service leader is first to the cloud-based market with a security solution that combines the key capabilities of user credentialing and authentication with single-sign-on for both SaaS and legacy applications. - April 26, 2013 - CloudAccess
Thursby Releases Secure CAC and PIV Browser for Good Technology
Thursby Software Systems, Inc., released PKard® for Good Technology, a special version of its PKard Reader secure browser app leveraging the Good Dynamics®’s mobile application platform for iPad and iPhone users. - April 25, 2013 - Thursby Software Systems, Inc.