Computer Security News

Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.

ISMG Announces Launch of "FFIEC Guidance: How to Use Layered Security to Fight Fraud" Webinar

Information Security Media Group, publisher of BankInfoSecurity, announces the launch of its latest webinar, "FFIEC Guidance: How to Use Layered Security to Fight Fraud," which will debut September 29. - September 15, 2011 - Information Security Media Group

Bat Blue Delivers Comprehensive Mobile Device Security Solution

The First Mobile Threat Management and Data Leakage Prevention Offering - September 14, 2011 - Bat Blue Corporation

ClickSSL Action for Network Security Against Hackers and Viruses

Secure your online transaction from hackers and viruses with SSL Certificate. ClickSSL provides SSL Certificates to protect online portal from hackers. - September 14, 2011 - ClickSSL

Applying New Mathematics for Robust Cryptography and a Safer Internet

Computer security experts are piggy-backing on recent developments in mathematics to pioneer new cryptography methods that will keep data safe even in the age of superfast quantum computing. - September 14, 2011 - Stevens Institute of Technology

GuardTime Selected as Top 10 Finalist for Innotribe Start-Up Challenge

GuardTime, is pleased to announce that it has been selected as a top 10 finalist in the Innotribe $100K Start-Up Challenge, honoring the company as one of the most promising financial technology and financial services start-ups. - September 10, 2011 - GuardTime Pte Ltd

Global Digital Forensics Helps Minimize the Financial Impact of Data Breaches Which Cost US Companies Billions Every Year

The aftermath of a successful data breach can have far reaching consequences. Not only must the immediate damage and/or losses be considered, which can be catastrophic enough, but the potent doses of caustic toxins a successful breach can inject into formerly healthy relationships with clients,... - September 08, 2011 - Global Digital Forensics

Falcongaze Introduces SecureTower to the South Korean Market

Falcongaze Company, the developer of software solutions for protection against internal threats, has signed a partnership agreement with SoftMail, which has its own extensive channel network in South Korea and Japan and has already started promoting SecureTower in the regional market. - September 07, 2011 - Falcongaze Ltd.

High-Tech Bridge is a Speaker and Gold Sponsor at Hashdays 2011 by DEFCON Switzerland

High-Tech Bridge is a Speaker and Gold Sponsor at Hashdays 2011 by DEFCON Switzerland

High-Tech Bridge SA (htbridge.ch), a leading Swiss information security and ethical hacking company, invites security specialists, researchers and IT managers to join the hashdays 2011 conference, dedicated to cyber security and risks, organized by DEFCON Switzerland. High-Tech Bridge is proud to... - September 05, 2011 - High-Tech Bridge SA

noodIT.com Announces 100% Threat Detection and Prevention for August, 2011

With over 31 Millions instances scanned noodIT.com announced a 100% detection and resolution rate for August 2011. 100% of PC infections were stopped before causing problems for their customers last month. - September 04, 2011 - noodIT Services, LLC.

Private WiFi Incorporates Customer Testimonials Into Its Website

Private WiFi Incorporates Customer Testimonials Into Its Website

Private WiFi has rebuilt its Company Profile section, giving customers the opportunity to share their experiences of using the software by offering their own testimonials. - August 31, 2011 - Private WiFi

JETprotect Corporation Provides ActiveSentry™ VFR™ Wide Area Security for Libyan Petroleum Assets

JETprotect Corporation Provides ActiveSentry™ VFR™ Wide Area Security for Libyan Petroleum Assets

JETprotect, an innovator in the field of high tech surveillance equipment and analytics, announced today the application of their newest product – ActiveSentry™ Virtual Fence Radar™ for Libyan Petroleum Assets. - August 31, 2011 - JETprotect

Global Digital Forensics Helps Tackle Social Media to Maximize eDiscovery Benefits

Global Digital Forensics Helps Tackle Social Media to Maximize eDiscovery Benefits

When social media and digital evidence collide, Global Digital Forensics can help. - August 27, 2011 - Global Digital Forensics

eReviewGuide.com Explosion in Online Fraud Provokes Drastic Action

eReviewGuide.com releases crucial information regarding increasingly shocking and clever online scam schemes. This guide helps consumers avoid becoming victims of such schemes. These drastic steps are fairly simple and require key changes in attitude. - August 26, 2011 - eReviewGuide.com

West Coast Labs Validates BalaBit’s Shell Control Box 3.0 and syslog-ng Store Box 2.0 Performance

BalaBit IT Security, one of the global leaders in developing privileged activity monitoring, trusted logging and proxy-based gateway technologies, announced that two of its products have been reviewed by West Coast Labs, an independent product test lab, under its Performance Validated program. The testers found that both BalaBit products met benchmark criteria: the appliances are easily integrated, provide high availability, and are 100% accurate. - August 26, 2011 - xyz

IQ Tech Pros Joins E-Verify Program

Enrollment provides more opportunities for job-seekers; Peace-of-mind for partners. - August 26, 2011 - IQ Tech Pros

GuardTime Keyless Signatures Selected by Cernam to Deliver the World's First Purpose-Built System for Capturing Online Evidence

Cernam's integration of GuardTime Keyless Signatures allows for the preservation of online content as legal evidence, delivering proof of integrity for a uniquely fragile form of digital data. - August 26, 2011 - GuardTime Pte Ltd

eReviewGuide.com Releases Network Security Prophylactics

Protecting your computer from internet and network-based security threats involve many layers of protection. Each layer is a prophylactic. The eReviewGuide.com network security guide outlines these prophylactic layers for maximum network security and protection. - August 25, 2011 - eReviewGuide.com

Proprietary Data Leakage and Theft – Time to Put Your Foot Down

CurrentWare, developers of Internet and Endpoint Security Solutions, are pleased to announce the release of a Device Reporter in AccessPatrol version 4.1, the popular device blocking software. Identify employees that are misusing storage and mobile device usage policies, through the new Device Reporter of AccessPatrol. - August 25, 2011 - CurrentWare

Radware Claims Three "2010 Communications Solutions Product of the Year" Awards

Radware’s Alteon 5412, DefensePro and Content Inspection Director Commended for second consecutive year. - August 23, 2011 - Radware

Global Digital Forensics Can Help Thwart Internal Cyber Threats

Global Digital Forensics Can Help Thwart Internal Cyber Threats

The Global Digital Forensics team has been fighting in the trenches as cyber intrusion responders for over two decades, evolving in lockstep with the ever changing landscape of cyber threats. So, when it comes to exposing flaws and weaknesses in an organization’s cyber security posture, that... - August 22, 2011 - Global Digital Forensics

Bit9 to Present Webinar on How to Stop Advanced Persistent Threats, Not Innovation

Live Webcast with the Nonprofit, Center for American Progress, to Discuss How Application Whitelisting Saved Their Organization - August 22, 2011 - Bit9, Inc.

SERDI Awarded GSA STARS II GWAC Contract

8(a) STARS II is a multiple-award, indefinite delivery/indefinite quantity (IDIQ) Contract engineered to provide cutting edge technology solutions from award winning 8(a) small businesses to federal agencies. - August 22, 2011 - SERDI

WebRenderer Swing Edition 6.0 – 64bit Beta Ships

WebRenderer Swing Edition 6.0 – 64bit Beta Ships

JadeLiquid™ is pleased to announce the long awaited beta release of the WebRenderer™ Swing Edition 6.0 supporting 64bit systems. The beta of WebRenderer 6.0 includes support for both 32 and 64bit systems on Windows, OSX and Linux (other platforms to follow). The WebRenderer Swing... - August 17, 2011 - JadeLiquid Software International

FastWords Featured on "Death of the Password"

Security Expert Appears on Canada’s CBC Radio “The Current” - August 17, 2011 - FastWords

Cost Management Group to Host the Dallas Technology Summit

Cost Management Group to Host the Dallas Technology Summit

Cost Management Group to host the Dallas Technology Summit, featuring cloud executives from some of the most respected companies, to be held on Thursday, August 25th, with a 2:00 pm registration, at the Hilton DFW Lakes Hotel. - August 11, 2011 - Cost Management Group

TeamLab Online Scanner: Whitelisting and Open Source as Keys to PC Security of the Future

TeamLab Online Scanner: Whitelisting and Open Source as Keys to PC Security of the Future

Ascensio System SIA launches TeamLab Online Scanner, a new free online application based on the advanced whitelisting technology. - August 11, 2011 - Ascensio System SIA

GoldKey Unveils Vital Security Features for Active Directory

GoldKey USB Security Token seamlessly integrates with Active Directory to provide two-factor authentication. - August 11, 2011 - GoldKey Security Corporation

Global Digital Forensics Offers Proactive Solutions to Secure US Cyber Assets

Global Digital Forensics Offers Proactive Solutions to Secure US Cyber Assets

US cyber assets are at risk and under assault from all directions. Foreign nations, organized hacker groups and rogue hackers alike, are all targeting our most sensitive digital information. Waiting to become a victim is not only foolhardy, but completely unnecessary, because Global Digital Forensics offers proactive solutions to help you significantly improve the security of cyber assets - before the possibility of an intrusion becomes an eventual reality. - August 10, 2011 - Global Digital Forensics

BluePrint Data Offers Internet Filtering for Mobile Phones and Smart Devices

BluePrint Data today announced it is offering its OEM web content / URL filter technology and security products and services to providers of mobile phone and internet service. The BluePrint Data offerings can be used by service providers that allow Internet access on their devices. BluePrint Data... - August 10, 2011 - BluePrint Data

Groteck Business Media Presents Best Cloud Services and Invaluable Experience of Biggest Russian Customers at InfoSecurity Russia 2011

The VIII International InfoSecurity Russia, StorageExpo & Documation Show 2011 presents best practices of the leading vendors and the biggest Russian end-users. - August 10, 2011 - Groteck Business Media

Datalight Announces File Level Secure Delete on e•MMC 4.4x

Datalight is unveiling software support for secure delete as defined within the e•MMC 4.40 and 4.41 specifications. - August 09, 2011 - Datalight, Inc.

Virtual Desktop Provider Desktop Anywhere Launches New Service Due to Increasing Demand for UK Cloud Computing Services

Desktop Anywhere is a UK cloud computing company specialising in virtual desktops and cloud computing services for companies with anywhere between 5-1,000 users. With clients in various industries such as finance, property investment, fashion, professional services and publishing, they are a... - August 08, 2011 - Desktop Anywhere

Groteck Business Media Names Five Reasons to Join InfoSecurity Russia 2011

Alexander Vlasov, Business Development Executive for Groteck Business Media, names five reasons to join InfoSecurity Russia, StorageExpo & Documation Show 2011 - August 03, 2011 - Groteck Business Media

BluePrint Data Cloud Based OEM Internet Filtering Now Available for Managed Service and Software as a Service Providers

BluePrint Data today announced the availability of its OEM cloud based Internet Filtering services to Managed Service Providers (MSPs) and Software as a Service (SaaS) providers. The cloud based service significantly decreases the time and complexity of integrating a URL / Web Content Filtering... - July 31, 2011 - BluePrint Data

Defense Industry Job Seekers and Employers Stream to ClearedCandidates.com

Defense Industry Job Seekers and Employers Stream to ClearedCandidates.com

The ClearedCandidates.com Defense industry online resume database and job board, announced today that unique visitors to www.ClearedCandidates.com have increased over 700% from an average of 5,275.67 Absolute Unique Visitors per month in the 1st Quarter of 2011 to an average of 38,359.33 Absolute... - July 26, 2011 - ClearedCandidates.com LLC.

BluePrint Data Launches New Website Categorization Service for Law Enforcement

BluePrint Data today announced the launch of a new website categorization service specifically for law enforcement and investigative entities. The new service will allow law enforcement and other entities to lookup a website category in real-time via the BluePrint Data cloud engine or offline via... - July 20, 2011 - BluePrint Data

Black Box Showcases Secure Government IT Solutions at FOSE 2011 Including Security Patch Cables, WAN Encryption Device, and Secure KVM Switch

Live Demonstrations to be Held at Booth #601 During the Three-Day Conference - July 20, 2011 - Black Box Network Services

IPod Cover Seller iThrough Launched Anti-Hacker Actions

Apple accessories site iThrough invited experts to fight against hackers since hackers become more and more rampant recently. - July 20, 2011 - iThrough

ITM Secure Has Successfully Tested 4shared

ITM Secure, an Internet security service, has successfully tested 4shared for phishing, identity fraud, spam, viruses, adware and spyware. 4shared.com was tested for secure purchase of premium account and premium features operability. ITM Secure head of marketing Marcus Jakobson... - July 17, 2011 - ITM Secure

Improve Your PC Speed: Chicago Computer Club Shows You How

Improve Your PC Speed: Chicago Computer Club Shows You How

Before finding yourself faced with expensive computer repair bills, why not take these simple steps to get your PC computer back up and running like it used to. While a computer fix might be necessary for some computer problems, taking a few simple proactive measures can help speed up your computer, as well as make your computer more secure. - July 16, 2011 - Chicago Computer Club

Capriotti’s Taps Industry Expert, SecureConnect for Comprehensive PCI Compliance Solution

SecureConnect and Capriotti’s Sandwich Shop partner to provide the quick serve sandwich brand with a managed PCI compliance solution and network security. - July 15, 2011 - SecureConnect Inc

William Hunteman, Former Senior Executive at the Department of Energy, Joins Planet Technologies

Planet Technologies, an award-winning technology consulting firm headquartered in Germantown, Maryland, announced today that William “Bill” Hunteman has joined the company as a Senior Advisor for Cyber Security Strategy. Bill will be leveraging his vast experience in cyber security,... - July 09, 2011 - Planet Technologies

PCI Compliance Provider Changes Name to Reflect Company Growth

BHI Advanced Internet, Inc. is now SecureConnect Inc. - July 08, 2011 - SecureConnect Inc

GeoCommerce Enters Into Strategic Relationships

Privately held, GeoCommerce, Inc., an enterprising provider in commerce technology, announced today it is in the process of consummating strategic relationships to ensure their footing in the future of Consumer Identification and Authentication. - July 07, 2011 - GeoCommerce

Power.org Presents “Multi-Core Application and Performance: Protecting OEMs’ Software Investment” Webinar

Webinar to highlight design considerations and security features required for mission critical and sensitive system applications. Educational series highlights celebration of Power Architecture® technology’s 20th anniversary while delivering value to the design community. - July 07, 2011 - Power.org

Versatile Security Delivers a Revolutionary Approach to Managing the Lifecycle of Smart Cards

Versatile Security has just released the vSEC:CMS T-Series. It brings a completely new approach to managing the lifecycle of smart cards, not requiring expensive hardware and dedicated servers. The system is implemented and ready to use in minutes, rather than months of complicated and resource consuming integration work. - July 02, 2011 - Versasec AB

Don't Risk Identity Theft When Recycling Your Electronic Devices

Many consumers and businesses make the vital mistake of recycling their electronic devices with companies that do not use proper recycling methods. By doing this, you are compromising critical data. - June 30, 2011 - Southeastern Data

MSP University Announces New Partnership to Provide IT Professionals with Highly-Secure Cloud Email Service Offerings, Training and Support Services

Newly announced partnership provides largest online business improvement resource for IT professionals and managed service providers with highly secure Cloud email services, training and support. - June 28, 2011 - MSP University

Aujas Among the Most-Requested Information Risk / IT Security Firm at 2011 CIO & IT Security Forum

Senior IT decision makers knew who they wanted to talk to at the May 24-26, 2011 CIO & IT Security Forum – and they wanted to talk to Aujas. - June 22, 2011 - Aujas Networks

Online File Sharing Security Update: It’s Time for Real Security Solutions on the Cloud

Software developer Doug Oucharek of Cadent Computing and collaborative intelligence expert Stephen Joyce have teamed up to develop a solution to secure file sharing encryption with the launch of theLocBox. - June 18, 2011 - Local Search Heroes

Press Releases 2,301 - 2,350 of 3,275