Quantcast

Latest Computer security Stories

2014-06-03 08:41:01

Cloud Service Providers without Authority to Operate can utilize Autonomic Resources to gain compliance after the June 5 deadline. CARY, N.C., June 3, 2014 /PRNewswire/ -- Federal cloud vendors' deadline for FedRAMP authorization has arrived. As of June 5, 2014, Cloud Service Providers (CSPs) serving government agencies without a FedRAMP Authority to Operate (ATO), will be out-of-compliance with the Office of Management and Budget's (OMB's) federal cloud security mandate. For those still...

2014-06-03 08:40:30

Empowers enterprise developers and ISVs to introduce innovative authentication methods for Good-secured apps, increasing flexibility and reducing costs for organizations NEW YORK and SUNNYVALE, Calif., June 3, 2014 /PRNewswire/ -- Good Technology(TM), the leader in secure mobility, today announced a Trusted Authentication Framework, enabling enterprise app developers and independent software vendors (ISVs) across the Good-secured ecosystem to easily leverage innovative multi-factor...

2014-06-03 08:28:21

Hearst Corporation's IT Security Head David Hahn Shares His Strategic and Tactical Advice on Enterprise Security and Risk TENAFLY, N.J., June 3, 2014 /PRNewswire/ -- securitycurrent, the news and information site for IT security professionals by IT security professionals, today announced the launch of a new column, "Ask the CISO" (Chief Information Security Officer) led by accomplished security expert David Hahn. Photo - http://photos.prnewswire.com/prnh/20140602/93450 In "Ask...

2014-06-03 08:23:49

LONDON, ON, June 3, 2014 /CNW/ - Utilismart Corporation, a world leading provider of energy management and settlement solutions for electric, water and gas utilities, has announced it successfully attained the International Organization for Standardization certification for Information Security Management (ISO 27001). This accreditation verifies that the ISO information security standard is now an integral component of all business processes within Utilismart. The ISO 27001...

2014-06-02 23:07:47

Applications for nominations accepted now through August 22, 2014. Awards include the Information Security Executive® of the Year, which recognizes executives who have made a positive impact on their organizations through risk management, data-asset protection, regulatory compliance, privacy and information security; and the ISE® Project of the Year, which recognizes a project completed during the previous 12-18 months that has had a significant impact on an organization’s risk...

2014-06-02 20:24:33

Software suite provides enterprise-grade security with turnkey, user-friendly functionality DALLAS, June 2, 2014 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global pioneer in security software, announced today a joint collaboration with Broadcom Corporation in the development of an integrated security solution optimized to protect home security networks from cyber threats and improve network visibility without compromising performance. "Our integrated security...

2014-06-02 20:24:23

MENLO PARK, California, June 3, 2014 /PRNewswire/ -- Nevales Networks, an innovator that securely connects branch offices, work groups, and remote workspaces, today released the key network security trends report for first quarter of the year 2014. The report is the outcome of data analysis of Nevales customers and reveals interesting statistics around the popular network security trends among users. (Logo: http://photos.prnewswire.com/prnh/20130515/613638 )...

Malicious Software Networks Shut Down By US-Led Investigation
2014-06-02 15:13:58

Peter Suciu for redOrbit.com - Your Universe Online On Monday the United States Department of Justice (DOJ) announced that it had lead a multinational action against the "Gameover Zeus" botnet and "cryptolocker" ransomware. These malware programs made up a global network of infected computers that were used by cyber criminals to steal millions of dollars from businesses and consumers. The DOJ unsealed criminal charges in Pittsburgh, Pennsylvania and Omaha, Nebraska against an...

2014-06-02 08:27:30

App Reputation Feature For Enterprises Enables Control, Visibility and Security for Mobile Device Apps SAN MATEO, Calif., June 2, 2014 /PRNewswire/ -- Mojave Networks, the leading provider of cloud-based mobile security for enterprises, today unveiled a new application reputation feature to provide enterprises with detailed insight into the applications that are being run on employee mobile devices. With this new feature, organizations can dissect and analyze the data being collected, stored...

2014-05-30 23:08:30

Trojans were responsible for four out of five infections worldwide; First three months of the year witnessed some of the biggest data thefts since creation of the Internet. Orlando, FL (PRWEB) May 30, 2014 Panda Security, The Cloud Security Company, has announced the latest findings of the PandaLabs Quarterly Report for Q1 2014. The main conclusions of the study include the fact that malware creation has broken all records during this period, with 15+ million new samples overall, and more...


Word of the Day
callithump
  • A somewhat riotous parade, accompanied with the blowing of tin horns, and other discordant noises; also, a burlesque serenade; a charivari.
'Callithump' is a back-formation of 'callithumpian,' a 'fanciful formation' according to the Oxford English Dictionary. However, the English Dialect Dictionary, says 'Gallithumpians' is a Dorset and Devon word from the 1790s that refers to 'a society of radical social reformers' or 'noisy disturbers of elections and meetings.'
Related