Quantcast

Latest Computer security Stories

2014-06-05 12:38:17

BOULDER, Colo., June 5, 2014 /PRNewswire/ -- During an upcoming webinar, LogRhythm, The Security Intelligence Company, and Ultimate Windows Security (UWS), a site devoted to spreading knowledge and understanding of Windows security, IT auditing and compliance, will share security monitoring lessons learned from the Target, Neiman Marcus and Sony data breaches. LogRhythm's Erick Ingleby and UWS's Randy Franklin Smith will lead the webinar on Tuesday, June 10, at noon eastern time....

2014-06-05 08:34:39

Changes driven by new cyber threats, security breaches and data loss in the United States, United Kingdom, France, Germany, Spain, Australia, Japan, South Korea and Taiwan SAN JOSE, Calif., June 5, 2014 /PRNewswire/ -- Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, today released a new report written by FieldFisher, a UK-based Law firm with deep expertise in global compliance, e-privacy, information management and data security. The report...

2014-06-05 08:32:48

SAN ANTONIO, June 5, 2014 /PRNewswire/ -- root9B, a leading provider of Cybersecurity services and training, recently assisted the 2014 National Collegiate Cyber Defense Competition (NCCDC) by providing advanced Cybersecurity capabilities for integration into the competition. The Center for Infrastructure Assurance and Security at the University of Texas at San Antonio (CIAS) started the competition in 2005 as a way for educational institutions to test and expand the practical...

free-form password protection
2014-06-05 04:43:10

Peter Suciu for redOrbit.com - Your Universe Online Security experts have long recommended that a "strong" password should be considered when using a PC, but the need for complex and hard to crack passwords has become even more necessary with the rise of mobile devices including phones or tablets. While hackers can try to remotely break into a system with mobile devices, users also need to watch out for prying eyes. "All it takes to steal a password is a quick eye," said Janne...

2014-06-04 23:14:11

SyferLock Technology Corporation (http://www.SyferLock.com) today announced that it has proven interoperability of SyferLock’s GridGuard™ two-factor and multi-factor authentication solutions with a range of Microsoft’s software including Office 365, Microsoft OneDrive, Microsoft Outlook Web Access and Windows Terminal Server. Shelton, CT (PRWEB) June 04, 2014 SyferLock Technology Corporation (http://www.SyferLock.com) today announced that it has proven interoperability of...

2014-06-04 23:05:40

Panel members include former deputy secretary of the Department of Homeland Security and Iowa’s chief information security officer Portland, Oregon (PRWEB) June 04, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that Elizabeth Ireland, vice president of marketing, will be moderating a panel discussion on cybersecurity strategy at the Gartner Security and Risk Management Summit 2014. The conference will take...

2014-06-04 23:02:32

Business Associates and Covered Entities can now download the industry leading HIPAA security awareness and training PPT presentation today from myhipaasecuritytraining.com, one of North America’s leading specialists in healthcare regulatory compliance. Atlanta, GA (PRWEB) June 04, 2014 Business Associates and Covered Entities can now download the industry leading HIPAA security awareness and training PPT presentation today from myhipaasecuritytraining.com, one of North America’s...

2014-06-04 16:20:44

New study analyzes security vulnerabilities of Keystone XL and the threat posed to nearby agricultural lands and waterways WASHINGTON, June 4, 2014 /PRNewswire/ -- The first-ever threat assessment of the proposed Keystone XL pipeline highlights the potential security vulnerabilities. The report finds that the pipeline has a high-risk of being exploited and could easily cause a catastrophic spill of more than seven million gallons of toxic tar sands "dilbit" into surrounding farmlands and...

Making The Internet Of Things Safer With New Tool Developed By Computer Scientists
2014-06-04 03:09:48

University of California, San Diego Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security- a first for the field. One of the tool’s potential uses is described in the May-June issue of IEEE Micro magazine. “The stakes in hardware security are high”, said Ryan Kastner, a professor of computer science at the Jacobs School of Engineering at UC San Diego. There is a big push to...

2014-06-04 08:40:56

CLEARWATER, Fla., June 4, 2014 /PRNewswire/ -- WHAT: ThreatTrack Security CEO Julian Waits, Sr. will host the 2014 Cyber Security Summit, taking place in Washington, D.C., on Thursday, June 5, 2014. The Summit brings C-level and senior executives responsible for protecting critical infrastructures together with cutting-edge technology providers and renowned information security experts. http://photos.prnewswire.com/prnvar/20140219/NE67666LOGO WHEN: Thursday, June 5, 2014, 8:55...


Word of the Day
Cthulhu
  • A gigantic fictional humanoid alien god being described with a head resembling an octopus and dragon wings and claws, around whom an insane cult developed.
  • Pertaining to the mythos of Cthulhu and additional otherworldly beings created by H. P. Lovecraft or inspired by his writings and imitators.
This word was invented in 1926 by H.P. Lovecraft for his short story, 'The Call of Cthulhu.' 'Cthulhu' may be based on the word 'chthonic,' which in Greek mythology refers to the underworld.
Related