Quantcast
Last updated on April 16, 2014 at 14:11 EDT

Latest Computer security Stories

2014-02-24 08:33:52

IT Admins Disagree on Level of Security, Priorities and Responsibility for Remediation HELSINKI and WALTHAM, Mass., Feb. 24, 2014 /PRNewswire/ -- Every day, countless invisible machine-to-machine (M2M) transactions and processes power automation of critical business and operational processes across industries. However, even as automated processes become the dominant mode of computing - outstripping the traditional model of interactive human-to-computer transactions - M2M security is often...

2014-02-24 08:33:26

Over 2.6M users benefit from integrated cloud data visibility and control SAN JOSE, Calif., Feb. 24, 2014 /PRNewswire/ -- Today, CipherCloud, the leader in cloud information protection, announces its continued platform innovation for enabling organizations to rapidly adopt cloud applications while protecting their sensitive data, ensuring compliance to policies and regulations, as well as ever growing unauthorized access, external threats and surveillance. Through these advancements, the...

2014-02-24 08:33:08

Company to share best practices and innovative technologies for dramatically improved threat detection, network forensics and incident response ATLANTA, Feb. 24, 2014 /PRNewswire/ -- RSA CONFERENCE -- Lancope, Inc., a leader in network visibility and security intelligence, will share industry best practices and showcase next-generation technology for combating advanced threats at RSA Conference 2014 taking place this week in San Francisco, CA. Through several speaker presentations, and a...

2014-02-24 08:32:36

MOBYLLA first customer to integrate native authentication into its mCloud services OAKBROOK TERRACE, Ill. and ZURICH, Feb. 24, 2014 /PRNewswire/ -- VASCO Data Security International, Inc. (Nasdaq: VDSI) (www.vasco.com), a leading software security company specializing in authentication products and services, launches today a native authentication integration solution for MYDIGIPASS.COM that allows application developers to protect their end users' online identity. VASCO is a world...

2014-02-24 08:28:48

DALLAS, Feb. 24, 2014 /PRNewswire/ -- Biometric fingerprint authentication isn't just for smartphones. Entrust, Inc. and 3M Cogent are integrating biometric fingerprint authentication into the award-winning Entrust IdentityGuard software authentication platform. This collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations. Entrust is embedding 3M(TM) Cogent fingerprint capture and verification technology, which...

2014-02-24 04:25:04

Partner-Application Security Scanning (PASS) Program Certifies Integrated Third-Party Applications to Manage Online Security Risks CAMPBELL, Calif., Feb. 24, 2014 /PRNewswire/ -- Cenzic, a leading provider of application security intelligence to reduce security risk, today announced the release of its Partner Application Security Certification Program, the first solution designed to manage and reduce online risk for enterprises connecting with third party applications. Offered via a...

2014-02-24 04:22:51

Coinciding with the Mobile World Congress, ESET is launching a #mobileweek initiative enabling users to enjoy premium features of ESET Mobile Security at just the half of its original price BRATISLAVA, Slovakia, Feb. 24, 2014 /PRNewswire/ -- ESET(®), the global leader in proactive digital protection with a record of 10 consecutive years of winning the prestigious VB100 awards with its ESET NOD32(®) technology, will showcase its portfolio of products for mobile devices at the...

2014-02-23 12:21:03

DALLAS, February 23, 2014 /PRNewswire/ -- ReportsnReports.com offers Global Homeland Security & Public Safety Market - 2014-2022 and Saudi Arabia HLS and Public Safety Market - 2014-2018 research reports in its store. Global Homeland Security & Public Safety Market - 2014-2022 is the most comprehensive homeland security market report providing information by and on 25 technology markets (biometrics, big data, etc), 15 vertical markets (aviation security, safe...

2014-02-22 23:00:45

Organizations can instantly download an incredibly in-depth information security policy manual today from the regulatory compliance experts at myinformationsecuritypolicy.com. The documentation, all contained within an in-depth information security policy manual, comes complete with literally dozens of essential security policies, procedures, forms, checklists, and so much more. Atlanta, GA (PRWEB) February 22, 2014 Organizations can instantly download an incredibly in-depth information...

2014-02-21 23:05:03

CompliancePoint, an information security consulting and compliance services provider, announces the launch of its Continuous Compliance & Assurance Program which helps organizations achieve compliance with standards such as HIPAA/HITECH and PCI, as well as maintain their compliance levels throughout the year. Using a company’s internal resources or CompliancePoint’s Security Consulting Services in combination with CompliancePoint’s SaaS-based Compliance Automation Portal...