Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
Success Computer Consulting, Inc., Hosts Apple Technical Training for Twin Cities Partners
Success Computer Consulting, Inc. has hosted the technical and engineering staff of several leading Twin Cities-based managed service providers in a two-day Apple Mobility Technical Competency workshop, part of the nationwide rollout of the Apple Consultants Network. The training featured hands-on... - April 03, 2012 - Success Computer Consulting, Inc.
Success Computer Consulting, Inc., Honored as One of the Top Managed Service Providers in North America
Success Computer Consulting, Inc. has been named to Nine Lives Media’s 2012 MSPmentor 200 North America Edition, an annual list identifying North America’s top 200 managed service providers (MSPs). MSP’s are firms that provide a variety of computer networking and Information... - April 02, 2012 - Success Computer Consulting, Inc.
Namtek Partner Adds Security for Companies Selling Business Services on Amazon’s Cloud Platform
By subscribing to Alert Logic’s latest solution, Threat Manager, customers add vulnerability assessment and intrusion detection to their infrastructure running on the Amazon Web Services platform. - March 31, 2012 - Namtek Corp.
Information Security Forum Launches Threat Horizon 2014
ISF's Annual Report Provides Organizations with Insights Into Managing Risks as Security Threats Collide - March 29, 2012 - Information Security Forum
CloudAccess SSO Now Google App Certified
CloudAccess' cloud-based security solution: single sign on (SSO) acquires certification for use with Google Apps. - March 25, 2012 - CloudAccess
Versatile Security Announces Partnership with vNext
Versatile Security and vNext announce partnership to bring the vSEC:CMS smart card management system to the French market. - March 25, 2012 - Versasec AB
BluePrint Data Celebrates One Year of Its Zero False Positive Internet Filter Guarantee
Users of BluePrint Data’s Web site / URL Content Filtering are guaranteed their users will not be blocked access to a URL due to it being wrongly categorized. - March 24, 2012 - BluePrint Data
Namtek Corp. to Participate in the 2012 Fort Bragg Technology Expo
IT security systems integrator, Namtek Corp., will exhibit at this year’s Fort Bragg Technology Expo to be held at the Fort Bragg Club on April 20, 2012. - March 24, 2012 - Namtek Corp.
CopyRight2 - Important New Features to Further Simplify Windows Server Migrations
Sys-Manage, a Microsoft® Gold Certified ISV partner and vendor of systems management software, announced today the availability of maintenance release 2.125 for CopyRight2, a product to aid in the process of file server and domain migrations. "This update release adds important new... - March 21, 2012 - Sys-Manage A. Denter e.K.
IEEE SmartGridComm 2012 to Address Worldwide Advance of Energy Infrastructure from November 5 – 8 in Tainan City, Taiwan
Third Annual Conference Announces May 6, 2012 as “Call for Papers” Deadline - March 21, 2012 - IEEE Communications Society
SAP America entrusts A1QA with Software Testing Project
A1QA, a recognized leader in providing full-cycle quality assurance and application testing services, announced today the final delivery of a software testing project for SAP America Inc, a North American branch of SAP AG, the renowned authority in the enterprise application software... - March 21, 2012 - A1QA Software Testing Company
Utah IT Consulting Company Adds Network Security to Tech Support Services
Wazi Technical Solutions (WaziTech) is excited to announce that they have officially added Network Security Audits to their line-up of Technical Support services. Frans Van Rooyen, CIO of WaziTech, has a personal passion for computer security and "ethical hacking"; frequently attending... - March 21, 2012 - Wazi Technical Soluitons
ISMG Announces the Launch of "The Fraud Dilemma: How to Prioritize Anti-Fraud Investments" Webinar
Information Security Media Group announces the launch of its latest webinar, "The Fraud Dilemma: How to Prioritize Anti-Fraud Investments," which will debut March 20, 2012 at 3:30 p.m. ET. The 90-minute session is sponsored by ThreatMetrix™ and will feature insight from George... - March 18, 2012 - Information Security Media Group
DCIA Brings CLOUD COMPUTING CONFERENCE to NAB
SRO Expected for Second Annual DCIA-within-NAB Event - March 17, 2012 - Distributed Computing Industry Association
"Everything I Know About Cloud Security I Learned From 'Star Trek'" Webinar to Share Best Practices, Strategies
A live webinar hosted by CloudAccess will define security-as-a-service best practices using the familiar lessons and concepts inspired by Star Trek on March 21. - March 16, 2012 - CloudAccess
CeBIT 2012 - Effective "Managing Trust" Starts with the Secure Signature in Documents
signotec attracts a positive result from this presentation; more interested persons, qualitative interviews, a significant customer orders and existing growth market. - March 16, 2012 - signotec
Exponential Growth in Internet Usage Across Varied Segments Boosts Security Software Market, Finds Netscribes
Netscribes (India) Pvt. Ltd., launches Security Software Market in India 2011 report covering a market with strong growth potential. It is a part of Netscribes’ Information Technology Series. - March 16, 2012 - Netscribes, Inc.
TECHEXPO to Host an Exclusive Cyber Security Hiring Event March 20th in Columbia, Maryland
In support of the Nation’s ongoing mission to safeguard & secure our cyberspace, TECHEXPO Cyber Security will hold its semi-annual hiring event on March 20th in Columbia, Maryland. - March 15, 2012 - TECHEXPO Top Secret
CloudAccess Extends CISCO MARS Conversion Program
CloudAccess transition program provides Cisco MARS customers an improved and cost-friendly alternative for SIEM capabilities that offers greater flexibility and strategic risk mitigation. First 30 days Free. - March 15, 2012 - CloudAccess
Private WiFi to be Offered to Mediabistro.com AvantGuild Members
AvantGuild Members Will Receive Discounted Pricing on WiFi Security - March 14, 2012 - Private WiFi
ISMG Announces Launch of "BYOD: Manage the Risks and Opportunities" Panel Webinar
Information Security Media Group announces the launch of its latest panel webinar, "BYOD: Manage the Risks and Opportunities," which will debut March 14, 2012. The 90-minute session is led by security expert Malcolm Harkins, CISO, Intel, and it is sponsored by Fixmo, VASCO Data Security... - March 14, 2012 - Information Security Media Group
ISMG Wraps Up Coverage from RSA Conference 2012
Information Security Media Group (ISMG), Platinum Media Sponsor of the USA RSA Conference 2012 for the third consecutive year, announces its wrap-up of extensive coverage from this year's event. - March 11, 2012 - Information Security Media Group
Becrypt Announces New US Engineering Services Division to Support Growing Customer Base
Award winning cyber solutions provider employs more US-based staff to provide responsive local services to customers. - March 08, 2012 - Becrypt
GiiResearch.com: Global Cyber Warfare Market – North America to Represent 46% Market Share
Global spending on cyber warfare systems is expected to remain robust - March 07, 2012 - Global Information Inc.
Security Industry Recognizes CloudAccess with Two InfoSecurity Global Excellence Awards
CloudAccess won two prestigious awards for Best Security Service and Most Innovative Security Service of the Year at the 2012 Global Excellence Awards hosted by InfoSecurity Products Guide. - March 06, 2012 - CloudAccess
Grassroots Tech Community Brings Symantec CEO and $10,000 Hacker Contest to Kansas City
A grassroots technology community in Kansas City organizes information security event, featuring keynote from Symantec CEO and a competition w/ $10,000 in cash/prizes. - March 05, 2012 - Kansas City IT Professionals
Second Annual IEEE Online Conference on Green Communications to be Held September 25 – 28, 2012
“Call for Papers” Ends April 3 for Original Paper Submissions Exploring Energy-efficient Communications Technologies & Networking Solutions. - March 03, 2012 - IEEE Communications Society
Becrypt Launches tVolution, Ultra Secure, Ultra Thin Virtualized Environment at RSA Conference USA
Leading cyber security vendor announces secure replacement operating system for virtualized desktops providing secure and low cost VDI - March 01, 2012 - Becrypt
CounSol.com Offers a Virtual Platform for Mental Health Professionals Who Seek to Manage Their Practices and Deliver Counseling Online
Many mental health professionals have been waiting on a “one-stop shop,” a platform that offers practice management as well as online counseling delivery. Now a reasonably priced and HIPAA-secure option is available. - February 29, 2012 - Online Therapy Institute
IEEE ICC 2012 to Feature “Paperless+” Wireless Networking Event from June 10 – 15 in Ottawa, Canada
Attendees to Receive Blackberry Playbook 16GB Containing Event Program, Proceedings, News & Papers Highlighting Nearly 1,500 Presentations as Part of Registration Package - February 28, 2012 - IEEE Communications Society
FEITIAN Technologies Co Ltd., Brings Colourful Security Solutions to RSA Conference 2012
FEITIAN Technologies Co Ltd., (www.ftsafe.com), a leading software security company specializing in authentication products, today announces they will attend the RSA Conference in San Francisco, USA. - February 26, 2012 - Feitian Technologies Co., Ltd.
UK Government Cyber-Crime Report Shows That Technical Solutions Alone Are Not Enough
The UK Government’s Science and Technology Committee has published a report on malware and cyber-crime with important recommendations that, if implemented, will have a major impact on the UK’s cyber-security at the everyday consumer level. - February 24, 2012 - commissum
Becrypt Extends Ultra-Secure Encryption for Tablet Devices with DISK Protect
Federal agencies now able to benefit from versatile tablet form factor while meeting legislative requirements to protect sensitive data. - February 24, 2012 - Becrypt
ElcomSoft Discovers Most of Its Customers Want Stricter Security Policies but Won’t Bother Changing Default Passwords
Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords, as discovered by ElcomSoft Co. Ltd. after conducting a research and running a quiz on its Web site. A major player in the password... - February 24, 2012 - Elcomsoft
MedForward Offers HIPAA-Secure Online Form Submission to the Medical and Mental Health Professions
Now physicians, counselors and psychotherapists need not worry about clients' sensitive information ending up in the cyberspace abyss. HIPAA-secure online form submission ensures that personal information is delivered confidently. - February 23, 2012 - Online Therapy Institute
Online Event Addresses Viability of Cloud-Based Security
Cloud Access is hosting a free online web roundtable and webinar event to discuss the questions surrounding the viability, affordability and risk reduction capabilities of security-as-a-service managed from the cloud. - February 22, 2012 - CloudAccess
Indigo Identityware Announces Password-Free Roaming to and from Desktops and Tablets
Indigo’s mobile solution offers clinicians the ultimate flexibility and security in virtual environments. - February 19, 2012 - Indigo Identityware
CloudAccess Grabs 5 Nominations from InfoSecurity's Global Excellence Awards
Security-as-a-service market leader CloudAccess garnered five nominations including Best Cloud Security Product and Best Security Service from the 2012 Global Excellence Awards sponsored by industry monitor Info Security. - February 18, 2012 - CloudAccess
Kindle Fire Now Supported by Fiberlink’s MaaS360 Mobile Device Management Solution
MaaS360 empowers IT professionals to provide the mobile device choice employees want and the network and data security organizations require. - February 17, 2012 - MaaS360 by Fiberlink
Green Armor C.E.O. Discusses Weaknesses of New DMARC Anti-Phishing Initiative
Joseph Steinberg, C.E.O. of Green Armor Solutions, describes severe flaws in DMARC, the latest infrastructure-based attempt at combating phishing. - February 16, 2012 - Green Armor Solutions
IDGA's Cloud Computing for DoD & Government
With an ever-increasing number of companies now buying computing, storage, and networking power on-demand from the Cloud, there has never been a greater need for a one-stop event that brings together players from the main layers of the Cloud ecosystem - the infrastructure players, the platform providers, and those offering applications. You can get a copy of the agenda by visiting the website at http://www.CloudComputingEvent.com. - February 16, 2012 - IDGA
Becrypt Trusted Client Secure Remote Working Now Available for Mac and PC on Same USB Device in Industry First at RSA Conference USA
Award winning secure remote access solution Trusted Client now boots from Mac/EFI machines and Intel/BIOS machines from the same USB stick supporting the consumerization of IT. RSA Conference, February 27 to March 3, Moscone Center, San Francisco Booth #442. - February 16, 2012 - Becrypt
Information Security Forum Releases Cyber Security Strategies Report to Help Organizations Achieve Cyber Resilience
Cyber Security Strategies: Achieving Cyber Resilience, addresses the "risk vs. reward" aspects of cyberspace, explores the nature of existing and emerging cyber threats, discusses potential common root causes for cyber security breaches and provides guidance on cyber security strategies and approaches organizations should consider adopting. - February 15, 2012 - Information Security Forum
Vitarsoft Company Released PC Anti Theft Software, miTracker
Vitarsoft Co., Ltd, a world-class software developer in PC security, today announced the availability of the full version of its PC Anti Theft Software, miTracker. The official website is http://www.mitracker.com/. There is a data from the FBI, 1 in 10 laptops purchased today will be stolen within... - February 14, 2012 - iAidsoft Corporation
ISMG Announces the 2012 Cloud Security Survey
Information Security Media Group (ISMG) announces the launch of its 2012 Cloud Security Survey. This study, the first global survey spanning all of ISMG's media sites, will look at not only organizations' cloud security concerns, but also at how security leaders are addressing these concerns... - February 12, 2012 - Information Security Media Group
ISMG Announces the 2012 Faces of Fraud Survey: Complying with the FFIEC Guidance
Information Security Media Group (ISMG), publisher of BankInfoSecurity, announces the launch of its 2012 Faces of Fraud survey. A follow-up to ISMG's 2011 Faces of Fraud Survey, this study looks not only at the latest fraud trends and how institutions are fighting back, but also at their progress in putting together layered security controls in conformance with the FFIEC Authentication Guidance. - February 12, 2012 - Information Security Media Group
TITUS a Silver Sponsor at RSA Conference 2012 in San Francisco
TITUS is once again a Silver Sponsor at RSA Conference 2012, taking place from February 27 to March 2 at the Moscone Center in San Francisco. - February 11, 2012 - TITUS
Interactive Security LLC & Cyber Data Risk Managers LLC Announce Their Strategic Partnership
Interactive Security LLC & Cyber Data Risk Managers LLC have partnered together to provide a complete end to end cyber security solution for businesses. Many businesses are fast realizing that cyber insurance is as important as maintaining a secure cyber environment. - February 11, 2012 - Interactive Security LLC
Instant Checkmate Surpasses 100,000 Subscribers in Under a Year
The meteoric rise of Instant Checkmate has recently been punctuated by hitting a major milestone, years ahead of schedule. The Las Vegas based company attributes its success to great customer service, aggressive goal setting and follow through, the growth of social media, and good timing. - February 10, 2012 - Instant Checkmate
ElcomSoft Recovers iWork Passwords, Supports Apple Numbers, Pages, and Keynote Apps
ElcomSoft Recovers iWork Passwords, Supports Apple Numbers, Pages, and Keynote Apps. - February 10, 2012 - Elcomsoft