Quantcast

Latest Computer security Stories

2014-08-05 23:10:08

Enterprise-class Offering Combines Pwnie Express Sensors with Central Management for Remote Location Intelligence Boston, Massachusetts (PRWEB) August 05, 2014 Pwnie Express, the only company to assess wired and wireless network security in remote locations on demand, today announced the Pwn Pulse software as a service (SaaS) solution. The enterprise-class offering uses Pwnie Express’s easy-to-deploy sensors to provide highly scalable continuous intelligence. An end-to-end security...

2014-08-05 23:05:31

Splunk dashboard utilizes data from Lumeta ESI to close the gap in network visibility. Somerset, NJ (PRWEB) August 05, 2014 Lumeta Corporation has enhanced the integration between its Lumeta ESI (Enterprise Situational Intelligence) software and Splunk Enterprise real-time operational intelligence software. Feeding Lumeta’s comprehensive network intelligence into Splunk increases its effectiveness and provides joint customers with enhanced network situational awareness. Lumeta ESI...

2014-08-05 23:04:03

Leading Provider of Context-Based Security and Advanced Fraud Prevention Selected as a Silver Winner in the Enterprise Product of the Year – Software Category San Jose, CA (PRWEB) August 05, 2014 ThreatMetrix®, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced it has been named a Silver winner in the Best in Biz Awards 2014 International in the “Enterprise Product of the Year – Software” category. Now in its...

2014-08-05 23:03:34

CradlePoint facilitates distributed enterprise compliance with centralized management, increased visibility and intrusion prevention. (PRWEB) August 05, 2014 CradlePoint, the global leader in 4G LTE wireless networking solutions for distributed enterprises, today announced CradlePoint Secure Threat Management, an Intrusion Prevention Solution (IPS) integrated with its cloud network management solution, Enterprise Cloud Manager. CradlePoint Secure Threat Management leverage’s Trend...

2014-08-05 16:20:36

WALTHAM, Mass., Aug. 5, 2014 /PRNewswire/ -- General Dynamics Fidelis Cybersecurity Solutions announced that it has partnered with CrowdStrike to provide customers with access to shared threat intelligence that will further improve the prevention, detection, attribution and remediation of cyber-attacks in real-time. Supplementing the proprietary threat intelligence provided by General Dynamics Fidelis' threat research team, integrated YARA rules and other industry partnerships, the...

2014-08-05 08:41:23

Evaluation Based on Completeness of Vision and Ability to Execute SANTA CLARA, Calif., Aug. 5, 2014 /PRNewswire/ -- NSFOCUS, Inc., a global provider of distributed denial of service (DDoS) mitigation solutions and Web security, today announced it has been included in Gartner's first Web Application Firewall (WAF) Magic Quadrant Report. NSFOCUS is positioned for its "completeness of vision" and "ability to execute." http://photos.prnewswire.com/prnvar/20140514/87828 NEWS FACT: -- Gartner...

2014-08-04 23:06:06

On August 5, The Peggy Smedley Show will welcome newly appointed Deputy Commander of U.S. Cyber Command at Fort Meade, Maryland, Lieutenant General James McLaughlin, and other cyber security experts, including Ed Scheidt, former chairman of the CIA Cryptographic Center. Carol Stream, IL (PRWEB) August 04, 2014 Protecting and securing the nation’s infrastructure from cybercrime is what the newly appointed Deputy Commander of U.S. Cyber Command at Fort Meade, Maryland, Lieutenant General...

2014-08-04 23:02:05

Session will take place Wednesday, August 6 at 3:00 PM PST. Portland, Oregon (PRWEB) August 04, 2014 Tripwire, Inc., a leading provider of advanced threat, security and compliance solutions, today announced that, Ken Westin, security analyst for Tripwire, will be presenting at BSides Las Vegas. The conference will take place August 5 – 6, 2014, at the Tuscany Suites and Casino in Las Vegas, Nevada. According to the 2014 Verizon Data Breach Investigations Report, incidents caused by...

2014-08-04 08:32:09

LONDON, Aug. 4, 2014 /PRNewswire/ -- Hacking is on the rise in Europe, and unfortunately many UK companies are still playing catchup in the race against cyber criminals. New data theft methods like memory scraping malware are helping hackers infiltrate seemingly-secure systems with relative ease, resulting in the theft of potentially millions of customer data records whilst generating significant financial liability and a steep drop in trust with their customers. With all the news...

internet privacy thinkstock 186160396
2014-08-04 02:00:59

National Science Foundation NSF announces two Frontier-scale projects, part of a $74.5 million investment to support foundational cybersecurity research and education As our lives and businesses become ever more intertwined with the Internet and networked technologies, it is crucial to continue to develop and improve cybersecurity measures to keep our data, devices and critical systems safe, secure, private and accessible. On July 31, 2014, the National Science Foundation's (NSF)...


Word of the Day
tessitura
  • The prevailing range of a vocal or instrumental part, within which most of the tones lie.
This word is Italian in origin and comes from the Latin 'textura,' web, structure.