Computer Security News

Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.

CloudAccess Identity and Access Management Packages Updated with New Application and Platform Connectors

Cloud security firm adds salesforce.com, SAP ECC, AS400, GoogleApps and to its growing advanced adapter library. - July 29, 2013 - CloudAccess

ShieldApps Selected by 3 Dragons Media as Software Provider for Its APAC Distribution

Locally operated software company "ShieldApps - Software Solutions" announced today that it will be providing all carrier and performance applications to 3 Dragons Media’s APAC distribution effective August 1st, 2013. According to ShieldApps’ officials this is a first step... - July 28, 2013 - ShieldApps

StrikeForce Technologies Awarded Second Patent for Out-of-Band Authentication Utilizing Mobile Devices

StrikeForce Technologies, Inc. (SFOR), a company that specializes in cyber security for the prevention of data breaches, announced today that it has been granted its second patent for “Multi-Channel Device Utilizing A Centralized Out-of-Band Authentication System” from the United States... - July 27, 2013 - StrikeForce Technologies, Inc.

Tactical FLEX, Inc. Webcast Introduces Suricata IDS, Emerging Threats ETPro™ Ruleset, and Aanval SAS

Tactical FLEX, Inc. and Matt Jonkman with Emerging Threats and the Open Information Security Foundation Delivered an Educational Webinar on How to Improve Threat Management Performance and Situational Awareness. - July 27, 2013 - Tactical FLEX, Inc.

Comodo Announces Free Online Webinar on Endpoint Security

Comodo, a leading provider of trust-based Internet security products, announced a free online webinar today focusing on endpoint security and automated sandboxing co-hosted by Ziff Davis Media. The webinar is scheduled for August 7th, 2 P.M. EST. To register:... - July 27, 2013 - Comodo

FarStone® Releasing Their Flagship Product RestoreIT 2013, Supports Upcoming Windows 8.1

FarStone® Releasing Their Flagship Product RestoreIT 2013, Supports Upcoming Windows 8.1

FarStone is cheerfully announcing the release of their brand new product called RestoreIT 2013 for PC’s. RestoreIT takes snapshots (creates a Restore Point) of any modifications that occur on the system and allows users to restore anything beyond control like virus infection, registry corruption, accidentally deleted files, etc. - July 26, 2013 - FarStone Technology Inc.

Presensoft Helps FERC Firms Fill Compliance Gaps

Presensoft’s Message Archiving provides compliance security, prevention, and detection in addition to archiving services. - July 23, 2013 - Presensoft Inc.

IEEE ICC 2014 to Explore “Communications: The Centrepoint of the Digital Economy” from June 10 – 14 in Sydney, Australia

“Call for Papers” Ends September 15, 2013 for Original Submissions Detailing the Latest Findings & Research in the Complete Range of Wireless and Wireline Communications - July 23, 2013 - IEEE Communications Society

StrikeForce’s UK Distributor, CDISGroup Ltd., to Launch Large Pilots for Corporate Customers to Prevent Identity Theft and Data Breaches of Their Clients

The Organizations Include: Financial Service Organizations, Retail Shopping Giants and Mortgage Lending Institutions - July 20, 2013 - StrikeForce Technologies, Inc.

Global4PL Announces Major Global Supply Chain Contract Proving Importer of Record / Exporter of Record (IOR-EOR) Services

Global4PL Announces Major Global Supply Chain Contract Proving Importer of Record / Exporter of Record (IOR-EOR) Services

Global4PL Supply Chain Services, an industry leading supply chain consulting and global trade management company, announced today that an undisclosed Hi-Tech Fortune 500 company has selected Global4PL to provide Importer/Exporter of Record and RMA depot services in Latin America and Asia, including... - July 19, 2013 - Global4PL

Aanval and Emerging Threats Host Webinar on Enhancing Visibility and Protection Against Malware on Suricata & Snort IDS/IPS

Live Webinar Featuring Tactical FLEX, Inc. and Emerging Threats’ Global Marketing and Product Management Director Byron Rashed for a discussion on trends and malware attacks seen in enterprise networks today and solutions to minimize business risks.  - July 19, 2013 - Tactical FLEX, Inc.

StrikeForce Signs Agreement with One of Israel’s Leading Homeland Security Distributors

StrikeForce Technologies, Inc. (OTCBB: SFOR) today announced it has signed a distributor agreement with A.R. Challenges, Ltd. one of Israel’s leading Cyber Security distributors, specializing in Homeland Security, Critical Israeli Infrastructure and enterprise security. “StrikeForce is... - July 13, 2013 - StrikeForce Technologies, Inc.

Play Panda Security’s "Space Invaders" on Facebook and Win an iPad Mini

Panda Security launches Facebook game to raise awareness about the importance of a virus-free world. Each week, the highest score will win an iPad Mini. - July 12, 2013 - Panda Security

Fake "Internet Security" Virus Storms Internet, Infecting Thousands

OnlineVirusRepair.com launches new fast and highly effective removal method for users infected with the “Internet Security virus.” - July 12, 2013 - Online Virus Repair Inc.

Megamind Launches Live, Instructor-Led Online 2-Day CISM® Prep Training Class Taught by Security Expert, Krag Brotby, Principal Author ISACA CISM Review Manual

If you're planning to take the CISM® Exam, then this is the training class for you. Megamind's CISM® PREP TRAINING is specifically designed to prepare attendees for the official CISM® Exam. This intensive 2-day training focuses on developing the unique and essential examination skills necessary for success on the CISM EXAM, and helps to avoid the mistakes so many make that often result in failure. Attendees are provided with a set of invaluable tools and approaches to prepare for the CISM Exam. - July 11, 2013 - Megamind Training Institute

Virtualized Encryption Key Management Now Possible with Alliance Key Manager for VMware

Alliance Key Manager for VMware enables enterprises to lower operational costs, meet compliance requirements, deploy key management in the cloud, and accelerate deployment of mission critical security technology through a virtualized encryption key manager. - July 10, 2013 - Townsend Security

ISMG Launches DDoS Resource Center

Information Security Media Group, publisher of BankInfoSecurity and InfoRiskToday, announces the launch of its new Resource Center covering the DDoS attack phenomenon. The site, sponsored by Akamai, Fortinet, Neustar, Radware and VeriSign, is dedicated to providing in-depth news, analysis and insights from ISMG's staff and top mitigation experts on the latest incidents, emerging trends and prevention strategies. - July 10, 2013 - Information Security Media Group

Internet Privacy Supporters to Boost CloudLocker Indiegogo Campaign

Crowdfunding campaign offers new technology to address recent concerns with online privacy and unwanted access to stored data. - July 04, 2013 - StoAmigo

Contego Solutions Partners with Nuix to Bolster Its Digital Forensics Capabilities

Nuix will help Contego Solutions customers find answers fast amongst large and complex evidence sets. - July 03, 2013 - Contego Data Solutions FZ-LLC

Cloud Security Leader Unveils Best Practices to Make Regulatory Compliance Easier

CloudAccess presents new white paper that explores the strategic advantages of applying unified and collaborative security options to cost-effectively and efficiently manage compliance requirements. - July 01, 2013 - CloudAccess

GoldKey Security Kryptors Pass FIPS 140-2 Certification Testing

GoldKey Security Corporation announced the completion of the FIPS 140-2 certification testing requirements for GoldKey Security Kryptors. FIPS 140-2 testing is considered to be one of the most rigorous and stringent certification testing procedures in the industry. It is a mandated requirement by... - June 27, 2013 - GoldKey Security Corporation

Revelations About PRISM Have Businesses Seeking Data Storage Alternatives

Revelations About PRISM Have Businesses Seeking Data Storage Alternatives

Revelations about the once-secret government data collection program known as PRISM, which was exposed as a major source of National Security Agency raw intelligence from 2007-present, have American businesses on edge regarding data security. With privacy concerns reaching an all-time high,... - June 25, 2013 - d2 Business Solutions

Apriorit Adapts Nanomites for Linux: Modern Antidebug Protection

Apriorit Adapts Nanomites for Linux: Modern Antidebug Protection

This month, Apriorit company releases the new technology of Linux application protection from illegal debug, dumping, and reversing based on the so-called nanomites. Modern and efficient, the nanomite technology is successfully used in the commercial protectors for Windows systems. Apriorit Linux Code Protection SDK is the first product to provide an improved nanomite protection for Linux applications. - June 24, 2013 - Apriorit

StrikeForce Signs Agreement with One of Europe’s Leading Cyber Security Distributors - with Access to Over 100,000 Independent Resellers

Commences Major Campaign Launch in 13 Countries for GuardedID’s Anti-Keylogging Keystroke Encryption Technology - June 23, 2013 - StrikeForce Technologies, Inc.

ISMG Announces 2013 Mobile Security Survey Results Webinar

Information Security Media Group (ISMG), publisher of BankInfoSecurity, today announces the launch of its latest webinar, "Beyond BYOD: 2013 Mobile Security Survey Results," which will debut June 25 at 3:30 p.m. ET. At a time of unprecedented mobile device adoption - and evolving mobile... - June 23, 2013 - Information Security Media Group

CloudAccess, IdentityForge Collaborate to Expand Identity Management from the Cloud

Partnership to combine development and distribution of new user account control and security connectors for applications. - June 21, 2013 - CloudAccess

NovaStor Partners Take Note of Sales Growth Following Backup Certification

Through better understanding and positioning of backup & restore products, IT resellers find new opportunities to generate revenue by protecting customer data. - June 21, 2013 - NovaStor

Virus Protection and Content Security Solution from BowBridge Achieves SAP Certification

As the first vendor, BowBridge supports SAPs new content security interface – also on SAP HANA. - June 19, 2013 - BowBridge Software

Security Enterprise Introduces Quantum Advance in Credit Card Fraud and Identity Theft Prevention

GarbleCard ™ unveils new patent pending technology for defeating rampant RFID skimming. - June 19, 2013 - Garble LLC

Syncdocs Encrypts Google Drive Data for Extra Security

New App Secures Google Data from Spying - June 19, 2013 - Syncdocs

ISMG Announces the 2013 Bit9 Cybersecurity Study

Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of the 2013 Bit9 Cybersecurity Study, which will help determine the impact of today's advanced cyber attacks, where organizations are least prepared to detect and prevent advanced cyber attacks, and cyber attack defense spending priorities for 2014. - June 16, 2013 - Information Security Media Group

Panda Cloud Antivirus 2.2 Adds Data Shield, Parental Control and Rescue Boot creator

Version 2.2 includes the features most frequently requested by the Panda Cloud Antivirus user community, as well as a special area for the most advanced users. Panda Cloud Antivirus 2.2 has a Community Labs area, to deliver new, free tools to the user community. - June 16, 2013 - Panda Security

Marathon IT Services & Varonis Scale the Information Mountain Together

Showing customers how to handle extreme data at the aiim Roadshow, 20 June 2013, ILEC, London - June 15, 2013 - Marathon IT Services

Bluewolf and FinancialForce Announce Global Partnership

FinancialForce and Bluewolf announced strategic global partnership to help companies challenged to consolidate information across disparate customer relationship management (CRM), back office and supply chain applications using joint cloud-based applications and services. - June 14, 2013 - FinancialForce.com

ISMG Announces the 2013 Faces of Fraud Survey: The Threat Evolution

Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of its 2013 Faces of Fraud survey. A follow-up to ISMG's 2010 and 2011 Faces of Fraud surveys, this new research, sponsored by Easy Solutions, looks not only at the latest fraud trends and how institutions... - June 12, 2013 - Information Security Media Group

Panda Cloud Antivirus Free Achieves Third Consecutive Virus Bulletin VB100 Certification

Panda Cloud Antivirus Free is one of the least resource-intensive solutions according to the prestigious testing antivirus authority where Panda Cloud Antivirus has received 100 percent of all certifications since taking part in Virus Bulletin’s reviews. - June 08, 2013 - Panda Security

High-Tech Bride Named a Top Trusted Website in OTA’s 2013 Online Trust Honor Roll

High-Tech Bride Named a Top Trusted Website in OTA’s 2013 Online Trust Honor Roll

High-Tech Bridge SA announced it has been named to the Online Trust Alliance (OTA) 2013 Online Trust Honor Roll for demonstrating exceptional data protection, privacy and security in an effort to better protect their customers and brand. For High-Tech Bridge this is a second consecutive nomination... - June 05, 2013 - High-Tech Bridge SA

Fixico Launches Consumer 24/7 Computer Support Based on Proven Enterprise IT Technology

Fixico Launches Consumer 24/7 Computer Support Based on Proven Enterprise IT Technology

Free, easy to use service, keeps computers fast, secure and worry-free, saving consumers time and money. - June 05, 2013 - Fixico

Recovery Software Updates RS File Recovery, Adding Pre-Recovery Preview for Multiple Formats

Recovery Software Updates RS File Recovery, Adding Pre-Recovery Preview for Multiple Formats

Recovery Software updates RS File Recovery, the company’s easiest to use undelete solution. Version 3.3 brings pre-recovery preview support for a number of additional formats including documents and spreadsheets in Microsoft Office 2013 format, certain compressed archives, as well as certain types of video and audio files. - June 03, 2013 - Recovery Software

Egress Forms Strategic Partnership with Data Regulation and Compliance Experts Regulatory Strategies

Egress Software Technologies partners with leading information security consultancy to help organisations mitigate information security risks and maximise compliance. - June 01, 2013 - Egress Software Technologies Ltd

NetAbstraction and Light Point Security Have Signed a Partnership Agreement to Offer Virtualization and Cloud Technologies to Protect Customer’s Online Activity

NetAbstraction combines their next-generation secure network with Light Point Security’s first and only server-based virtual-machine-in-a-browser. - May 30, 2013 - Light Point Security

Leading Environmental Services Organisation SDK Adopts Egress Switch to Secure Data Shared with External Partners and Remain Compliant with the DPA

Local Authority outsourcing service provider recognises the importance of secure communication as part of its client services responsibility by implementing leading email and file encryption solution. - May 23, 2013 - Egress Software Technologies Ltd

Hundreds of Leading Global Experts to Address Latest Advances in Voice, Data, Image & Multimedia Technologies at IEEE ICC 2013

Five-Day International Event to be held June 9 - 13 in Budapest, Hungary Expands Agenda to Include Nearly 1,500 Presentations Dedicated to Wireless and Wireline Communications - May 22, 2013 - IEEE Communications Society

Incident Response Survey: Organizations Ill-Prepared for Advanced Threats

Under the shadow of advanced cyber threats, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced persistent threats. These are among the main... - May 22, 2013 - Information Security Media Group

Westinghouse Lighting Avoids $50,000 Backup Appliance Cost with Zetta.net Backup and Recovery for SQL and Hyper-V Server Backup

Leading Lighting Manufacturer Replaces Symantec Backup Exec with Zetta.net to Overcome the Challenges of Tape Backup - May 16, 2013 - Zetta.net

96% of People Share Confidential Data with Third Parties, Regardless of Whether the Necessary Security is in Place to Protect the Information

Egress Software Technologies’ latest information security survey reveals that the business won’t be denied when it comes to sharing sensitive data – whatever the risk. - May 16, 2013 - Egress Software Technologies Ltd

Cloud Backup is Only the Beginning

Cloud Backup is Only the Beginning

NTI Launches Cloud-Supported NTI Backup Now EZ™ 3 with Special Promotion - May 15, 2013 - NTI Corporation

Revealing Cloud-Driven Best Practices for Fully Integrated Identity and Access Management

CloudAccess is hosting a free webinar titled: "One Click...From Directory to Cloud" on May 22 and May 28th at 11:00am to address best practices associated with user provisioning, password management, multi-factor authentication, application gateways and single sign on. - May 11, 2013 - CloudAccess

Don’t Become an Unwitting "Money Mule," Warns Information Security Firm

Information security firm commissum issues a warning to the public about the risk of becoming a “money mule,” unwittingly working for cyber-thieves. - May 10, 2013 - commissum

Microsoft System Center Data Protection Manager 2012 Book Set to Release June 2013

Microsoft System Center Data Protection Manager 2012 Book Set to Release June 2013

In the DPM 2012 book you will gain insight from Microsoft MVP's into the new features in DPM 2012 along with an understanding of the core tasks that administrators will face, including installing and configuring DPM 2012, workload protection, and managing the system. - May 08, 2013 - Buchatech

Press Releases 1,901 - 1,950 of 3,320