Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
CloudAccess Identity and Access Management Packages Updated with New Application and Platform Connectors
Cloud security firm adds salesforce.com, SAP ECC, AS400, GoogleApps and to its growing advanced adapter library. - July 29, 2013 - CloudAccess
ShieldApps Selected by 3 Dragons Media as Software Provider for Its APAC Distribution
Locally operated software company "ShieldApps - Software Solutions" announced today that it will be providing all carrier and performance applications to 3 Dragons Media’s APAC distribution effective August 1st, 2013. According to ShieldApps’ officials this is a first step... - July 28, 2013 - ShieldApps
StrikeForce Technologies Awarded Second Patent for Out-of-Band Authentication Utilizing Mobile Devices
StrikeForce Technologies, Inc. (SFOR), a company that specializes in cyber security for the prevention of data breaches, announced today that it has been granted its second patent for “Multi-Channel Device Utilizing A Centralized Out-of-Band Authentication System” from the United States... - July 27, 2013 - StrikeForce Technologies, Inc.
Tactical FLEX, Inc. Webcast Introduces Suricata IDS, Emerging Threats ETPro™ Ruleset, and Aanval SAS
Tactical FLEX, Inc. and Matt Jonkman with Emerging Threats and the Open Information Security Foundation Delivered an Educational Webinar on How to Improve Threat Management Performance and Situational Awareness. - July 27, 2013 - Tactical FLEX, Inc.
Comodo Announces Free Online Webinar on Endpoint Security
Comodo, a leading provider of trust-based Internet security products, announced a free online webinar today focusing on endpoint security and automated sandboxing co-hosted by Ziff Davis Media. The webinar is scheduled for August 7th, 2 P.M. EST. To register:... - July 27, 2013 - Comodo
FarStone® Releasing Their Flagship Product RestoreIT 2013, Supports Upcoming Windows 8.1
FarStone is cheerfully announcing the release of their brand new product called RestoreIT 2013 for PC’s. RestoreIT takes snapshots (creates a Restore Point) of any modifications that occur on the system and allows users to restore anything beyond control like virus infection, registry corruption, accidentally deleted files, etc. - July 26, 2013 - FarStone Technology Inc.
Presensoft Helps FERC Firms Fill Compliance Gaps
Presensoft’s Message Archiving provides compliance security, prevention, and detection in addition to archiving services. - July 23, 2013 - Presensoft Inc.
IEEE ICC 2014 to Explore “Communications: The Centrepoint of the Digital Economy” from June 10 – 14 in Sydney, Australia
“Call for Papers” Ends September 15, 2013 for Original Submissions Detailing the Latest Findings & Research in the Complete Range of Wireless and Wireline Communications - July 23, 2013 - IEEE Communications Society
StrikeForce’s UK Distributor, CDISGroup Ltd., to Launch Large Pilots for Corporate Customers to Prevent Identity Theft and Data Breaches of Their Clients
The Organizations Include: Financial Service Organizations, Retail Shopping Giants and Mortgage Lending Institutions - July 20, 2013 - StrikeForce Technologies, Inc.
Global4PL Announces Major Global Supply Chain Contract Proving Importer of Record / Exporter of Record (IOR-EOR) Services
Global4PL Supply Chain Services, an industry leading supply chain consulting and global trade management company, announced today that an undisclosed Hi-Tech Fortune 500 company has selected Global4PL to provide Importer/Exporter of Record and RMA depot services in Latin America and Asia, including... - July 19, 2013 - Global4PL
Aanval and Emerging Threats Host Webinar on Enhancing Visibility and Protection Against Malware on Suricata & Snort IDS/IPS
Live Webinar Featuring Tactical FLEX, Inc. and Emerging Threats’ Global Marketing and Product Management Director Byron Rashed for a discussion on trends and malware attacks seen in enterprise networks today and solutions to minimize business risks. - July 19, 2013 - Tactical FLEX, Inc.
StrikeForce Signs Agreement with One of Israel’s Leading Homeland Security Distributors
StrikeForce Technologies, Inc. (OTCBB: SFOR) today announced it has signed a distributor agreement with A.R. Challenges, Ltd. one of Israel’s leading Cyber Security distributors, specializing in Homeland Security, Critical Israeli Infrastructure and enterprise security. “StrikeForce is... - July 13, 2013 - StrikeForce Technologies, Inc.
Play Panda Security’s "Space Invaders" on Facebook and Win an iPad Mini
Panda Security launches Facebook game to raise awareness about the importance of a virus-free world. Each week, the highest score will win an iPad Mini. - July 12, 2013 - Panda Security
Fake "Internet Security" Virus Storms Internet, Infecting Thousands
OnlineVirusRepair.com launches new fast and highly effective removal method for users infected with the “Internet Security virus.” - July 12, 2013 - Online Virus Repair Inc.
Megamind Launches Live, Instructor-Led Online 2-Day CISM® Prep Training Class Taught by Security Expert, Krag Brotby, Principal Author ISACA CISM Review Manual
If you're planning to take the CISM® Exam, then this is the training class for you. Megamind's CISM® PREP TRAINING is specifically designed to prepare attendees for the official CISM® Exam. This intensive 2-day training focuses on developing the unique and essential examination skills necessary for success on the CISM EXAM, and helps to avoid the mistakes so many make that often result in failure. Attendees are provided with a set of invaluable tools and approaches to prepare for the CISM Exam. - July 11, 2013 - Megamind Training Institute
Virtualized Encryption Key Management Now Possible with Alliance Key Manager for VMware
Alliance Key Manager for VMware enables enterprises to lower operational costs, meet compliance requirements, deploy key management in the cloud, and accelerate deployment of mission critical security technology through a virtualized encryption key manager. - July 10, 2013 - Townsend Security
ISMG Launches DDoS Resource Center
Information Security Media Group, publisher of BankInfoSecurity and InfoRiskToday, announces the launch of its new Resource Center covering the DDoS attack phenomenon. The site, sponsored by Akamai, Fortinet, Neustar, Radware and VeriSign, is dedicated to providing in-depth news, analysis and insights from ISMG's staff and top mitigation experts on the latest incidents, emerging trends and prevention strategies. - July 10, 2013 - Information Security Media Group
Internet Privacy Supporters to Boost CloudLocker Indiegogo Campaign
Crowdfunding campaign offers new technology to address recent concerns with online privacy and unwanted access to stored data. - July 04, 2013 - StoAmigo
Contego Solutions Partners with Nuix to Bolster Its Digital Forensics Capabilities
Nuix will help Contego Solutions customers find answers fast amongst large and complex evidence sets. - July 03, 2013 - Contego Data Solutions FZ-LLC
Cloud Security Leader Unveils Best Practices to Make Regulatory Compliance Easier
CloudAccess presents new white paper that explores the strategic advantages of applying unified and collaborative security options to cost-effectively and efficiently manage compliance requirements. - July 01, 2013 - CloudAccess
GoldKey Security Kryptors Pass FIPS 140-2 Certification Testing
GoldKey Security Corporation announced the completion of the FIPS 140-2 certification testing requirements for GoldKey Security Kryptors. FIPS 140-2 testing is considered to be one of the most rigorous and stringent certification testing procedures in the industry. It is a mandated requirement by... - June 27, 2013 - GoldKey Security Corporation
Revelations About PRISM Have Businesses Seeking Data Storage Alternatives
Revelations about the once-secret government data collection program known as PRISM, which was exposed as a major source of National Security Agency raw intelligence from 2007-present, have American businesses on edge regarding data security. With privacy concerns reaching an all-time high,... - June 25, 2013 - d2 Business Solutions
Apriorit Adapts Nanomites for Linux: Modern Antidebug Protection
This month, Apriorit company releases the new technology of Linux application protection from illegal debug, dumping, and reversing based on the so-called nanomites. Modern and efficient, the nanomite technology is successfully used in the commercial protectors for Windows systems. Apriorit Linux Code Protection SDK is the first product to provide an improved nanomite protection for Linux applications. - June 24, 2013 - Apriorit
StrikeForce Signs Agreement with One of Europe’s Leading Cyber Security Distributors - with Access to Over 100,000 Independent Resellers
Commences Major Campaign Launch in 13 Countries for GuardedID’s Anti-Keylogging Keystroke Encryption Technology - June 23, 2013 - StrikeForce Technologies, Inc.
ISMG Announces 2013 Mobile Security Survey Results Webinar
Information Security Media Group (ISMG), publisher of BankInfoSecurity, today announces the launch of its latest webinar, "Beyond BYOD: 2013 Mobile Security Survey Results," which will debut June 25 at 3:30 p.m. ET. At a time of unprecedented mobile device adoption - and evolving mobile... - June 23, 2013 - Information Security Media Group
CloudAccess, IdentityForge Collaborate to Expand Identity Management from the Cloud
Partnership to combine development and distribution of new user account control and security connectors for applications. - June 21, 2013 - CloudAccess
NovaStor Partners Take Note of Sales Growth Following Backup Certification
Through better understanding and positioning of backup & restore products, IT resellers find new opportunities to generate revenue by protecting customer data. - June 21, 2013 - NovaStor
Virus Protection and Content Security Solution from BowBridge Achieves SAP Certification
As the first vendor, BowBridge supports SAPs new content security interface – also on SAP HANA. - June 19, 2013 - BowBridge Software
Security Enterprise Introduces Quantum Advance in Credit Card Fraud and Identity Theft Prevention
GarbleCard ™ unveils new patent pending technology for defeating rampant RFID skimming. - June 19, 2013 - Garble LLC
Syncdocs Encrypts Google Drive Data for Extra Security
New App Secures Google Data from Spying - June 19, 2013 - Syncdocs
ISMG Announces the 2013 Bit9 Cybersecurity Study
Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of the 2013 Bit9 Cybersecurity Study, which will help determine the impact of today's advanced cyber attacks, where organizations are least prepared to detect and prevent advanced cyber attacks, and cyber attack defense spending priorities for 2014. - June 16, 2013 - Information Security Media Group
Panda Cloud Antivirus 2.2 Adds Data Shield, Parental Control and Rescue Boot creator
Version 2.2 includes the features most frequently requested by the Panda Cloud Antivirus user community, as well as a special area for the most advanced users. Panda Cloud Antivirus 2.2 has a Community Labs area, to deliver new, free tools to the user community. - June 16, 2013 - Panda Security
Marathon IT Services & Varonis Scale the Information Mountain Together
Showing customers how to handle extreme data at the aiim Roadshow, 20 June 2013, ILEC, London - June 15, 2013 - Marathon IT Services
Bluewolf and FinancialForce Announce Global Partnership
FinancialForce and Bluewolf announced strategic global partnership to help companies challenged to consolidate information across disparate customer relationship management (CRM), back office and supply chain applications using joint cloud-based applications and services. - June 14, 2013 - FinancialForce.com
ISMG Announces the 2013 Faces of Fraud Survey: The Threat Evolution
Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of its 2013 Faces of Fraud survey. A follow-up to ISMG's 2010 and 2011 Faces of Fraud surveys, this new research, sponsored by Easy Solutions, looks not only at the latest fraud trends and how institutions... - June 12, 2013 - Information Security Media Group
Panda Cloud Antivirus Free Achieves Third Consecutive Virus Bulletin VB100 Certification
Panda Cloud Antivirus Free is one of the least resource-intensive solutions according to the prestigious testing antivirus authority where Panda Cloud Antivirus has received 100 percent of all certifications since taking part in Virus Bulletin’s reviews. - June 08, 2013 - Panda Security
High-Tech Bride Named a Top Trusted Website in OTA’s 2013 Online Trust Honor Roll
High-Tech Bridge SA announced it has been named to the Online Trust Alliance (OTA) 2013 Online Trust Honor Roll for demonstrating exceptional data protection, privacy and security in an effort to better protect their customers and brand. For High-Tech Bridge this is a second consecutive nomination... - June 05, 2013 - High-Tech Bridge SA
Fixico Launches Consumer 24/7 Computer Support Based on Proven Enterprise IT Technology
Free, easy to use service, keeps computers fast, secure and worry-free, saving consumers time and money. - June 05, 2013 - Fixico
Recovery Software Updates RS File Recovery, Adding Pre-Recovery Preview for Multiple Formats
Recovery Software updates RS File Recovery, the company’s easiest to use undelete solution. Version 3.3 brings pre-recovery preview support for a number of additional formats including documents and spreadsheets in Microsoft Office 2013 format, certain compressed archives, as well as certain types of video and audio files. - June 03, 2013 - Recovery Software
Egress Forms Strategic Partnership with Data Regulation and Compliance Experts Regulatory Strategies
Egress Software Technologies partners with leading information security consultancy to help organisations mitigate information security risks and maximise compliance. - June 01, 2013 - Egress Software Technologies Ltd
NetAbstraction and Light Point Security Have Signed a Partnership Agreement to Offer Virtualization and Cloud Technologies to Protect Customer’s Online Activity
NetAbstraction combines their next-generation secure network with Light Point Security’s first and only server-based virtual-machine-in-a-browser. - May 30, 2013 - Light Point Security
Leading Environmental Services Organisation SDK Adopts Egress Switch to Secure Data Shared with External Partners and Remain Compliant with the DPA
Local Authority outsourcing service provider recognises the importance of secure communication as part of its client services responsibility by implementing leading email and file encryption solution. - May 23, 2013 - Egress Software Technologies Ltd
Hundreds of Leading Global Experts to Address Latest Advances in Voice, Data, Image & Multimedia Technologies at IEEE ICC 2013
Five-Day International Event to be held June 9 - 13 in Budapest, Hungary Expands Agenda to Include Nearly 1,500 Presentations Dedicated to Wireless and Wireline Communications - May 22, 2013 - IEEE Communications Society
Incident Response Survey: Organizations Ill-Prepared for Advanced Threats
Under the shadow of advanced cyber threats, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced persistent threats. These are among the main... - May 22, 2013 - Information Security Media Group
Westinghouse Lighting Avoids $50,000 Backup Appliance Cost with Zetta.net Backup and Recovery for SQL and Hyper-V Server Backup
Leading Lighting Manufacturer Replaces Symantec Backup Exec with Zetta.net to Overcome the Challenges of Tape Backup - May 16, 2013 - Zetta.net
96% of People Share Confidential Data with Third Parties, Regardless of Whether the Necessary Security is in Place to Protect the Information
Egress Software Technologies’ latest information security survey reveals that the business won’t be denied when it comes to sharing sensitive data – whatever the risk. - May 16, 2013 - Egress Software Technologies Ltd
Cloud Backup is Only the Beginning
NTI Launches Cloud-Supported NTI Backup Now EZ™ 3 with Special Promotion - May 15, 2013 - NTI Corporation
Revealing Cloud-Driven Best Practices for Fully Integrated Identity and Access Management
CloudAccess is hosting a free webinar titled: "One Click...From Directory to Cloud" on May 22 and May 28th at 11:00am to address best practices associated with user provisioning, password management, multi-factor authentication, application gateways and single sign on. - May 11, 2013 - CloudAccess
Don’t Become an Unwitting "Money Mule," Warns Information Security Firm
Information security firm commissum issues a warning to the public about the risk of becoming a “money mule,” unwittingly working for cyber-thieves. - May 10, 2013 - commissum
Microsoft System Center Data Protection Manager 2012 Book Set to Release June 2013
In the DPM 2012 book you will gain insight from Microsoft MVP's into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. - May 08, 2013 - Buchatech