Cloudy with a Chance of Breaches
“Media reports of security incidents have become as commonplace as the weather forecast.” – PWC Global State of Info Security Survey, 2015 Over the past 12 months, nearly every…
“Media reports of security incidents have become as commonplace as the weather forecast.” – PWC Global State of Info Security Survey, 2015 Over the past 12 months, nearly every…
FST Biometrics, the leading biometric identification solutions provider, announced the release of two new products – one wireless and one portable – each designed to supplement the important work of…
For Small & Medium Business (SMB) organizations, anything in information technology is stretched thin due to tight budgets & shortage of skilled staff to administer and manage IT & Security…
Kaspersky Lab presents a new free Android app, a tool which enables users to protect the things that are valuable to them – their mobile devices and personal data. Phound!…
BT announced that it is integrating technology from Darktrace, one of the world’s fastest growing cyber threat defence companies, to deliver next-generation cyber threat detection and intelligence services to the…
HP announced that SAP will resell HP Fortify application security software as part of its quality assurance solutions portfolio. SAP is now offering the solution under the name SAP Fortify…
Juniper Networks announced the availability of Express Path, an optimization capability that delivers powerful performance enhancements to Juniper Networks SRX5000 Series Services Gateways. By boosting throughput to one Terabit per…
Dell announced a new endpoint security suite that enables businesses of all sizes to secure their workforce, protect data and meet compliance requirements. The Dell Data Protection | Endpoint Security…
The first malware to successfully outwit the CAPTCHA image recognition system has been detected by Kaspersky Lab’s security analysts. The Trojan-SMS.AndroidOS.Podec has developed a technique to convince CAPTCHA it is…
Recently, a security loop hole named Ghost Vulnerability has been found haunting Linux operating systems. This vulnerability lets a hacker gain complete control over the compromised system. Given that Linux…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More