Quantcast

Latest Computer security Stories

2014-08-26 16:30:56

NEW YORK and POINT ROBERTS, Washington, August 26, 2014 /PRNewswire/ -- Investorideas.com (http://www.investorideas.com), a global news source covering leading sectors releases the updated Cyber Security Stocks directory for investors following the sector. "Cyber threats are internet-based attempts to attack information systems and hack critical information. These threats include hacking, malware, and phishing, and have the capability to capture all the critical...

2014-08-26 08:37:47

Innovative cybersecurity firm fortifies executive leadership team, relentlessly focuses on changing how organizations respond to cyberattacks RESTON, Va., Aug. 26, 2014 /PRNewswire/ -- ThreatTrack Security - a leader in cyber threat prevention solutions that substantially change how organizations respond to cyberattacks - today announced the appointment of Stuart Itkin as Chief Marketing Officer. Itkin previously led global marketing at fast-growing startups and large public...

2014-08-26 08:37:15

Growth opportunities most significant for DBAs and Network / Security Consultants. CHICAGO, Aug. 26, 2014 /PRNewswire/ -- A recently published study from Gartner predicts that, by 2018, half of all businesses will hire IT security contractors to manage data security threats. The prediction is based on the finding that spending on IT security has risen 7.9 percent, to $71.1 billion, since 2013 and is likely to grow another 8.2 percent, to $76.9 billion, in 2015. Notably, much of...

2014-08-26 08:35:12

LogRhythm's product line depth is a significant differentiator and contributor to its market penetration leadership MOUNTAIN VIEW, Calif., Aug. 26, 2014 /PRNewswire/ -- Based on its recent analysis of the security information and event management/log management (SIEM/LM) market, Frost & Sullivan recognizes LogRhythm, The Security Intelligence Company, with the 2013 Global Frost & Sullivan Award for Market Penetration Leadership. LogRhythm has demonstrated outstanding business and...

2014-08-25 23:04:40

Security Testing Market majorly focuses on the basis of network services, application services, application types, tools, deployment models, industry verticals & by regions. (http://www.marketsandmarkets.com/Market-Reports/security-testing-market-150407261.html) (PRWEB) August 25, 2014 The report "Security Testing Market by Network Security Testing, Application Security Testing, SAST, DAST, Security Testing Tools, Penetration Testing Tools, Automated Testing Tools, Code Review...

2014-08-25 12:30:00

DALLAS, August 25, 2014 /PRNewswire/ -- ReportsnReports.com offers "Cyber Security Market (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SVM/SIEM, Disaster Recovery, DDoS Mitigation, Web Filtering, Security Services) - Global Advancements, Forecasts & Analysis (2014-2019)" - an April 2014 research report spread across 229 pages, in its store. In the report, cyber security market is defined as a combination of market...

2014-08-23 23:00:36

MacKeeper software helps return stolen computers by taking pictures of the person using the using it and generating a location report that can be used as evidence to assist the police in recovering missing property. Sunnyvale, CA (PRWEB) August 23, 2014 MacKeeper would like to announce the return of 500 lost or stolen computers in the first 8 months of 2014. The global technology research company Gartner Group reports that one laptop is stolen every 53 seconds in the United States. The...

2014-08-21 23:03:12

Tripwire survey examines views of information security professionals at annual IT security conference Portland, Oregon (PRWEB) August 21, 2014 Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada. Survey respondents were asked which security event had a greater impact on their budget and executive security awareness of...

2014-08-21 16:27:46

TAMPA, Fla., Aug. 21, 2014 /PRNewswire/ -- A legislative survey by 360 Advanced P.A. shows the U.S. Congress and some states are considering legislation that would require organizations managing databases of personal information to put in place safeguards against hacking - or face significant fines after a breach. In its analysis of data assembled by the National Conference of State Legislatures (www.ncsl.org) and www.govtrack.us, 360 Advanced concluded that with ever-increasing...

2014-08-21 16:27:44

Service tells enterprises if they are hacked 6x faster than competition SAN ANTONIO, Aug. 21, 2014 /PRNewswire/ -- Infocyte, Inc., a San Antonio-based cyber security startup, announced a new service for enterprise customers called an "Intrusion Assessment." The purpose of the assessment is to proactively determine if an organization's network has been breached by identifying the tools an attacker leaves behind to retain access and steal information. At a glance: -- Infocyte,...


Word of the Day
negawatt
  • A unit of saved energy.
Coined by Amory Lovins, chairman of the Rocky Mountain Institute as a contraction of negative watt on the model of similar compounds like megawatt.