Quantcast
Last updated on April 20, 2014 at 5:20 EDT

Latest Computer network security Stories

2014-02-07 12:21:33

Secures electric utility networks and systems RIDGEFIELD, Conn., Feb. 7, 2014 /PRNewswire/ -- Owl Computing Technologies, Inc., a network security solutions provider, is pleased to announce the deployment of Owl's Enterprise Perimeter Defense Solution (EPDS) in the fossil fired electric power plants of a major electric utility company in the United States. The company implemented the Owl perimeter defense solutions to adopt best practices that mitigate cybersecurity vulnerabilities...

2014-02-06 23:28:18

Telx Computers, a Miami web design, telecom, and VOIP solutions company, announced their new triple-protection program today for IT clients, as the threat of online hackers grows daily. Miami, FL (PRWEB) February 06, 2014 Between November 27th and December 15th, in the middle of the holiday season in North America, one of the largest retailers on the continent suffered a massive breach of customer data. Criminals were able to get credit card information, names, mailing addresses, email...

2014-02-06 23:20:46

Proficio, a provider of next-generation managed security services, today announced that Torrance Memorial Medical Center has selected Proficio’s ProSOC service for 24x7 managed security, compliance, and remediation. Irvine, CA (PRWEB) February 06, 2014 Proficio, a provider of next-generation managed security services, today announced that Torrance Memorial Medical Center has selected Proficio’s ProSOC service for 24x7 managed security, compliance, and remediation. “We selected...

2014-02-06 04:22:57

HAMBURG, Germany, February 6, 2014 /PRNewswire/ -- The German IT security specialist gateprotect AG Germany will be presenting a range of new IT security solutions "made in Germany" at CeBIT 2014 in Hannover. At the booths of the distributors Allnet GmbH (Hall 13 C 57) and sysob IT-Distribution GmbH & Co. KG (Hall 12 C 73), the new, easy-to-use entry-level UTM firewall GPO 110 for small company networks will be introduced. Likewise, the software version 9.4 will have its...

2014-02-05 23:26:36

Agentless Multi-Tenant Security, Antivirus and VM Isolation Help Enterprises and Cloud Providers to Enforce Security and Compliance for Hyper-V Seattle, WA (PRWEB) February 05, 2014 5nine Software, a leading provider of agentless security, compliance and management products for Microsoft Hyper-V, announced the immediate availability of new 5nine Cloud Security 4.0 for Hyper-V. The solution provides enterprises and cloud providers with agentless antivirus, comprehensive multi-tenant...

2014-02-05 23:25:26

Ovum, a leading global analyst firm, has recognized Security Compass’ SD Elements, the world’s first secure application lifecycle management (SALM) tool, as an innovative new preventive security solution worth watching for developers. SD Elements can reduce high-risk vulnerabilities in web and mobile applications by up to 97 percent. Toronto, ON (PRWEB) February 05, 2014 Security Compass, a leading web and mobile application security firm, is pleased to announce it has been recognized...

2014-02-05 08:32:50

Complimentary webinar to outline key technologies and best practices for detecting cyber-attacks and protecting Point of Sale (POS) systems ATLANTA, Feb. 5, 2014 /PRNewswire/ -- Lancope, Inc., a leader in network visibility and security intelligence, will present two complimentary webinars on Wednesday, February 12 at 9:00 a.m. and 2:00 p.m. U.S. Eastern time to help retailers avoid the onslaught of damaging data breaches that continue to tarnish some of the world's biggest and most trusted...

2014-02-05 08:29:28

Company issues 4th annual report analyzing breaches of protected health information (PHI). Cites 138% increase in large PHI data breaches in 2013; calls out lack of encryption of laptops as major contributing factor. CARPINTERIA, Calif., Feb. 5, 2014 /PRNewswire/ -- Redspin, Inc., a leading provider of penetration testing and IT security assessments, today released its annual Breach Report 2013 - Protected Health Information. In the report, Redspin provides in-depth analysis of the...

2014-02-04 23:02:47

Cybercrime is a booming, estimated $100 billion industry in the United States and shows no signs of slowing down. Attackers have an arsenal of weapons at their disposal, including social engineering (e.g. phishing), penetrating weak security protocols and exploiting software vulnerabilities that can serve as an “open window” into an organization’s IT environment; closing those windows requires effective and accessible tools to identify and root out software vulnerabilities. Madison,...

2014-02-04 12:32:36

FORT LAUDERDALE, Fla., Feb. 4, 2014 /PRNewswire-iReach/ -- Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today shared an analysis of nearly a dozen global DDoS attacks that indicates cyber attackers are using DDoS attacks in an attempt to influence market values and interfere with exchange platforms. The Prolexic Security and Engineering Team (PLXsert) details the findings in a white paper, DDoS Attacks Against Global Markets,...


Latest Computer network security Reference Libraries

25_edb73017b40afc155853d7b950ba54eb
2013-03-16 00:00:00

Wi-Fi, a trademark of the Wi-Fi Alliance, is not a technical term; however, the Alliance has used the term to describe only a narrow range of connectivity technologies including wireless local are network as well as PAN, LAN, and WAN. "IEEE 802.11", the technical term, has been used interchangeably with Wi-Fi even though Wi-Fi has become a superset of IEEE 802.11 over the past few years. It is used by over 700 million people and there are over 750,000 hotspots and around 800 million new Wi-Fi...

More Articles (1 articles) »