Computer Security News
Ensure that you get the latest news about the protection of data, networks and computing power. Find out about companies in the cybersecurity space, get business intelligence on securing systems and discover evolving partnerships affecting the future of computer security.
A Match Made in Heaven?: Cloud-Based MetaFlows Inc. Partners with Cybersift for High-Performance Network Security Monitoring
Cloud-Based High-Performance Network Security Partnership to be Showcased at SC10’s SCinet - November 12, 2010 - MetaFlows, Inc.
Celergy Sponsors Drag Car on SPEED TV - Sponsored Ford Mustang to Appear in TV Show, Pass Time
Celergy Networks, a nationwide provider of information technology and communications services, has announced its recent sponsorship of a drag race car in the popular racing TV series, Pass Time. “Several of us at Celergy are car enthusiasts and we chose to take advantage of this unique... - November 11, 2010 - Celergy Networks, Inc.
Crestron Earns Another Important U.S. Government Certification
DoD JITC Information Assurance (IA) Certification Enables Federal Government Agencies and U.S. Military Branches to Achieve Highly Secure AV Networks with Crestron Control Technology - November 11, 2010 - Crestron Electronics, Inc.
AMP Introduces Two Frame Grabbers for PC/104-Plus and Mini PCI
Advanced Micro Peripherals has introduced two high performance frame grabbers for the PC/104-Plus and mini PCI markets - both supporting 4 analog input channels with full frame rate video acquisition at full D1 NTSC / PAL image size (up to 720 x 576 pixels). These cards are well suited for... - November 10, 2010 - Advanced Micro Peripherals
viaForensics Uncovers Vulnerabilities in Smart Phone Financial Applications
viaForensics has released updated appWatchdog findings for mobile financial applications on both Google Android and Apple iPhone devices. - November 06, 2010 - viaForensics
Vincy Options Acquires Neptune Networks to Expand Intrusion and Malware Detection Capabilities
Vincy Options announced acquisition of Neptune Networks, which entails expansion of company’s research capabilities for IDS/IPS and Malware Detection. - November 05, 2010 - Vincy Options S.A.
Thirtyseven4 Antivirus Selected to Protect the Panhandle Independent School District
Texas school system requires a higher level of detection and removal of Malware switches anti-virus providers in favor of Thirtyseven4 Antivirus - November 04, 2010 - Thirtyseven4, LLC
Telemetry Labs and CoreGuard Form a Strategic Partnership for Next Generation M2M Application Security
CoreGuard is an exciting new software security solutions company located in Atlanta, GA and Washington, DC that has created WindTalker, a transformational technology to address ever-increasing threats to information security. WindTalker solutions are simple-to-use, hardware independent and secure information without impacting business operations. - November 03, 2010 - CoreGuard LLC
mtiks Announces Free Piracy Analytics for iPhone/iPad Apps
mtiks is a privately held firm located in Cambridge, MA, USA. mtiks is the leader in providing piracy analytics and anti-piracy solution for iPhone/iPad applications. - November 02, 2010 - mtiks LLC
Celergy Networks Strengthens Its Government Business
Veteran Brings Over 25 years of Experience in the Federal Domain - October 30, 2010 - Celergy Networks, Inc.
Revel Systems, an iPad Point of Sale Company Partners with Network Intercept to Provide Security to Their iPad Customers
Revel Systems, a next-generation mobile iPad Point of Sale provider, has joined forces with Network Intercept to create a new, leading-edge iPad POS system. Working in partnership, the two have created a revolutionary iPad POS system that uses Network Intercept’s Secure-Me solution to secure restaurant POS payments and provides the consumer with identity theft protection. - October 29, 2010 - Network Intercept
Bitrix Alerts About Trojan Program Disguising as Microsoft Silverlight Update and Bitrix Security Framework
Bitrix, Inc. alerts customers about the existence of a Trojan program pretending to be the Bitrix security framework. The Trojan is capable of stealing confidential data from infected computers and received the highest threat level from malware experts. - October 29, 2010 - Bitrix
Ipswitch Announces the Release of IMail Server v11.03
Ipswitch Messaging Division, the maker of IMail Server and Ipswitch Hosted Email, today announced the release of IMail Server v11.03. As a recognized leader in the messaging industry, Ipswitch continues to meet the demands of small and mid-sized businesses worldwide. - October 29, 2010 - Ipswitch Messaging Division
ASM Software Releases New BlackBox Security Monitor Professional
New Product Combines Most Comprehensive Monitoring with Power of Natural Language Processing to Record and Automatically Categorize User Activities - October 27, 2010 - ASM Software
modusGate Achieves VMware Ready Status for VMware vSphere 4
Vircom demonstrates its commitment towards virtualization by announcing its flagship email security product, modusGate, has passed VMware tests and reached VMware Ready status. - October 26, 2010 - Vircom Inc.
BHI SecureConnect Ranked No. 31 on Fast 50 List
The Minneapolis-St. Paul Business Journal ranks BHI on this year’s Fast 50 list of fastest-growing private companies in Minnesota. - October 24, 2010 - SecureConnect Inc
Digital Forensics Magazine Celebrates First Anniversary
Magazine aimed at digital and computer forensics specialists around the world marks first anniversary with special edition on training released 1st November 2010. - October 22, 2010 - Digital Forensics Magazine
NSF Grant Funds Cybersecurity Education at Stevens
A team of faculty and researchers from Stevens Institute of Technology are recipients of an NSF grant to further develop existing, nationally-recognized curricula in cybersecurity education. - October 21, 2010 - Stevens Institute of Technology
NTI Joins Forces with Trend Micro
NTI “Backup Now” bundled with Trend Micro’s cloud-powered consumer security for added data protection - October 20, 2010 - NTI Corporation
CipherPoint Software Enables Compliance and Secures Sensitive Content Stored in SharePoint
Company Launches CipherPointSP Enterprise™ and CipherPointKM™ Content Security Solutions for SharePoint - October 19, 2010 - CipherPoint Software, Inc.
Virtual Technology Group Joins LiveEnsure™ to Deliver Multi-Factor Authentication for Web and Mobile
The Virtual Technology group will be talking about LiveEnsure at this weeks IP Expo, Earls Court. - October 19, 2010 - LiveEnsure
Fedora Uses YubiKey for Strong Two-Factor Authentication
The YubiKey is being distributed to core Fedora Project team members to further enhance access control to high security hosts through multi-factor authentication. - October 17, 2010 - Yubico
Jeremy Godfrey, CIO for the Hong Kong Government to Speak at the Cloud Computing World Forum Asia
Jeremy Godfrey, CIO for the Hong Kong Government joins a number of high profile CIO’s and senior IT decision makers speaking at the Cloud Computing World Forum Asia – www.cloudcomputinglive.com/asia - taking place at The Mira Hotel, Hong Kong, on 17th and 18th November 2010. The two... - October 15, 2010 - Cloud Computing World Forum
Milton Security Group LLC Certified to Participate in the "Veterans First Contracting Program"
The U.S. Department of Veterans Affairs (VA), the Center for Veterans Enterprise (CVE), has officially certified Milton Security Group LLC as a Veteran-Owned Small Business. Milton Security Group LLC has now been added to the verified veteran business database at www.VetBiz.gov and is eligible to... - October 14, 2010 - Milton Security Group LLC
U.S. Foodservice Selects 3Delta Systems to Cut the Time, Expense and Risk of Processing and Storing Sensitive Customer Credit Card Data
CardVault Tokenization Secures Cardholder Information While Easing PCI Compliance. - October 14, 2010 - 3Delta Systems, Inc.
CompuLocks Announces Back-to-School Deals on Patented xTrap Cable Lock and All Its Computer Lock Products
Founder and CEO of CompuLocks Group, Gad Alexander announces back-to-school special deals on patented CL15T-xTrap cable lock and other winning lines of computer locks and security devices. - October 09, 2010 - Compulocks
ecycle to Provide Data Destruction Services for Copiers and Printers
ecycle announced today that is will be providing data destruction services for the hard drives inside copiers and printers to Milner Document Products. - October 09, 2010 - ecycle
SecureConnect Solution Delivers Value to Software Firm Through New Partnership
PCI Compliance Provider selected by Lighthouse Software to provide ASV vulnerability scanning to its client base. - October 08, 2010 - SecureConnect Inc
Versatile Security Announces Partnership with Gemalto
Versatile Security Sweden AB today announces a technology partnership with Gemalto, the world leader in digital security. vSEC:CMS® from Versatile Security is now fully integrated with Gemalto ProtivaTM .NET smart card. Moreover vSEC:CMS® Operator Token, which runs the vSEC:CMS®... - October 07, 2010 - Versasec AB
Stevens Students to Compete in Cyber Security Competition
After top-ten finishes in the qualifying round, two Stevens Institute of Technology teams will compete in the finals of the Capture the Flag Application Security Challenge October 29. Hosted by the Polytechnic Institute of New York University, the competition pits ten undergraduate teams against... - October 07, 2010 - Stevens Institute of Technology
Webinar Explains Why Privileged User Monitoring is Critical for Securing Data
An upcoming webinar hosted by Lumigent Technologies, Inc., will explain why gaining total visibility into all Privileged User Activity combined with a highly detailed and persuasive audit trail is critical for delivering insight and enable rapid remediation for all activity surrounding critical databases and data assets. - October 07, 2010 - Lumigent Technologies, Inc.
Axacore Expands Array of Available Storage Appliance Options
Axacore, a worldwide provider of fax and imaging solutions, now offers an expanded array of external storage appliance options for your data management and backup needs. In addition to the Network Storage Appliance – released in June 2010 – Axacore is now offering Storage options up to... - October 06, 2010 - Axacore Inc.
Information Security Media Group Announces Cloud Computing Security Panel Webinar
Publisher of BankInfoSecurity.com, CUinfoSecurity.com, GovInfoSecurity.com, and HealthcareInfoSecurity.com announces an online seminar focused on cloud computing security at banking institutions. - October 06, 2010 - Information Security Media Group
Sims Recycling Solution's Efforts to Help the Commercial Real Estate Industry
Sims Recycling Solutions, the world’s largest electronics recycler has become a Premier Lead Sponsor for the CREW Network. Sims Recycling Solutions will partner with CREW Network to be a part of the “Leading to Change” 2010 CREW Network Convention & Marketplace held in San Francisco October 20-23, 2010. Sims Recycling Solutions hopes to help raise awareness for the Commercial real estate industry on solutions to the compliance and security issues that they face. - October 06, 2010 - Sims Recycling Solutions
8el & Redstor Partnership Offers New Data Back-Up Service
8el partners with Redstor to expand its service offering to include online data backup - October 06, 2010 - Redstor
NetworksTraining Proudly Presents the Second Edition of Cisco ASA Firewall Fundamentals Configuration Guide
The first edition of Cisco ASA Firewall Fundamentals by Harris Andrea has been embraced by thousands of Cisco firewall administrators from all over the world. Now, the second edition of this electronic book is available for immediate download from NetworksTraining. - October 05, 2010 - NetworksTraining
Promark Technology Teams with CenterTools to Prevent Rising Threats of Data Leakage
Promark Technology, one of the premier value added distributors (VAD) in the United States, teams with CenterTools, a global provider of data security software. This partnership will allow value added resellers to provide their customers with CenterTools DriveLock™ endpoint security solution. - September 29, 2010 - CenterTools
CanIt 7.0.7 Anti-Spam Software Released
Roaring Penguin Software upgrades their CanIt line of anti-spam software for ISPs, Web Hosts, Universities, and Managed Services Providers. - September 29, 2010 - Roaring Penguin Software
Trusted Tek, a Woman-Owned Onsite Computer Repair / Support Business, Launched in South Florida
Onsite computer services business opens in South Florida to serve both businesses and residential consumers. - September 27, 2010 - Trusted Tek, LLC
Information Security Media Group Announces Platinum Media Partnership with the RSA Conference 2011
Information Security Media Group (ISMG), publisher of BankInfoSecurity.com, CUInfoSecurity.com, GovInfoSecurity.com, and HealthcareInfoSecurity.com, announces that it has been selected as a Platinum Media Sponsor of the USA RSA Conference 2011. The RSA Conference is one of the most comprehensive... - September 26, 2010 - Information Security Media Group
NSF Funds Research to Enable Distributed, Fair, and Privacy-Preserving Collaboration
Dr. Susanne Wetzel of Stevens Institute of Technology has been awarded a $457K research grant from the National Science Foundation to investigate privacy and security in the context of enabling collaboration. Dr. Wetzel’s successful proposal, “Distributed Privacy—Privacy-Preserving Policy Reconciliation,” supports core security research in the Department of Computer Science. - September 25, 2010 - Stevens Institute of Technology
Berkshire Products, Inc. Now Shipping a New PCIe Express PC Watchdog Timer
This new product release was made as part of Berkshire Products' commitment to enhanced customer satisfaction. Berkshire Products is recognized as an innovative computer hardware company focused on OS Watchdog timer solutions. - September 22, 2010 - Berkshire Products, Inc.
New Cloud Service for Optimizing SAP® Licenses Introduced by XPANDION
A new SaaS version of XPANDION’s LicenseAuditor for optimizing SAP licenses is now available. Requiring no additional hardware and no installation, LicenseAuditor-SaaS provides instant visibility of actual SAP license usage - identifying dormant, underused, duplicate, and misclassified SAP accounts. Analysis of periods of up to a year can be completed on the day of implementation, providing valuable data that can be used in discussions with SAP. - September 22, 2010 - Xpandion - SAP Solutions
Ciphent Continues to Pursue Global Growth Strategy
Ciphent, provider of world-class cyber security solutions, is proud to announce a major organization, infrastructure, and office expansion at their Hanover, MD headquarters as part of its ongoing global growth strategy. The neighboring office has doubled their office space to approximately 3,200 sq. - September 19, 2010 - Ciphent
Yubico Wins Award for Best Internet Security Solution
The YubiKey was named “Best Internet Security Solution” in Security Awards, conducted by the security industry’s leading magazine in Sweden. YubiKey is a unique authentication key for secure access to networks and services and a powerful solution for combating ID theft and cyber crime, says Security Awards experts. - September 19, 2010 - Yubico
Yubico Launches YubiKey with Challenge-Response Capability
Yubico adds optional challenge-response authentication feature to its popular YubiKey. This allows companies to charge for their services when the YubiKey is inserted into the USB port of the computer, as well as electronically sign data. - September 18, 2010 - Yubico
Cash Register Systems Selects Vendor Safe Technologies to Deliver PCI-DSS Solutions to Its Merchant Customers
Vendor Safe to provide simplified, low-cost PCI DSS compliance via SaaS - September 14, 2010 - Vendorsafe.com
Stevens Researchers Leverage Cryptography and Information Assurance to Re-Engineer Internet Architecture in Multi-University Collaboration Funded by NSF
Dr. Antonio Nicolosi, Assistant Professor of Computer Science at Stevens Institute of Technology is part of the interdisciplinary Nebula Project, a multi-university collaboration led by the University of Pennsylvania, which has recently been awarded a $7.5 million grant from the National Science... - September 14, 2010 - Stevens Institute of Technology
"Here You Have" Virus Emails Removed with metaLogic's Pursuit Tool
With the "trojan" virus "Here you have" infecting users' address books and filling inboxes with multiple emails, this latest virus is bringing down corporate email systems in some of the world's largest organizations. The Pursuit tool, developed by metaLogic for Lotus Notes Domino environments, is being used world wide by IT administrators to quickly purge these malicious messages from their email environment in order to prevent its spread. - September 12, 2010 - metaLogic Inc
Security Engineered Machinery's Hard Drive Shredder for Office Use
The new Model 0300 Jackhammer™ Hard Drive Shredder from Security Engineered Machinery (SEM) has a small footprint and is easy to use. Only 37” high, 45” wide, and 21” deep, it destroys hard drives, other electronic devices (cell phones, BlackBerrys®, PDAs, etc.), optical... - September 11, 2010 - Security Engineered Machinery