Quantcast

Latest Cyberwarfare Stories

2014-05-20 12:39:12

ARLINGTON, Va., May 20, 2014 /PRNewswire/ -- Lunarline Inc., a Service Disabled Veteran Owned Small Business and one of the nation's leading cyber security companies, was recently recognized as Virginia's 27(th) fastest-growing business during the 19(th) Annual Fantastic 50 Awards. http://photos.prnewswire.com/prnvar/20110622/PH24580LOGO The Virginia Chamber of Commerce presented the awards during the Fantastic 50 banquet, on May 1 at the Westfields Marriott in Chantilly. Contrary...

2014-05-20 08:22:12

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase DULLES, Va., May 20, 2014 /PRNewswire/ -- Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a new report issued today by Raytheon Company (NYSE: RTN), people with access to privileged data - such as health care records, sensitive company information, intellectual...

2014-05-20 08:21:47

Cyber Counterintelligence Firm Captures FireEye's Consulting Partner of the Year Award ST. LOUIS, May 20, 2014 /PRNewswire/ -- Today, St. Louis-based SpearTip announced it has been named the FireEye Consulting Partner of the Year. The award recognizes SpearTip for helping protect clients from targeted attacks and bringing customers the leading technology and service to keep their networks secure against advanced threats. http://photos.prnewswire.com/prnvar/20140514/87697...

2014-05-20 08:20:55

ANNAPOLIS, Md., May 20, 2014 /PRNewswire/ -- TeleCommunication Systems, Inc. (TCS) (NASDAQ: TSYS), a world leader in highly reliable and secure mobile communication technology, today announced that it has entered into a contract with E-volve Technology Systems (E-volve) to enable their delivery of TCS' professional services to the U.S. Air Force (USAF) for its Cyber Operations Training Program. The subcontract includes a base award term of five months and two, one-year option terms; all of...

2014-05-19 23:05:11

Leading ethical hacker Kevin Lam presents: "Hacking Into Your Healthcare Systems: Top Signs You're Prime for a Data Breach in 2014". This free webinar is provided by IronBox Secure File Transfer, a leading secure file transfer and data protection provider for healthcare, legal, accounting and financial professionals and OEM software developers. Redmond, WA (PRWEB) May 19, 2014 THE SPEAKER: Kevin Lam is a 15+ year expert in ethical hacking, secure application development and...

cybercrime china
2014-05-19 12:00:28

Peter Suciu for redOrbit.com - Your Universe Online On Monday the United States Department of Justice (DOJ) announced that cyber-spying charges had been filed against five officers of the Chinese military. The DOJ accused them of stealing trade secrets from six US companies. This is the first such case where an indictment for economic espionage has been brought against foreign government officials. The officers were identified as Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu...

2014-05-19 08:32:57

SAN JOSE, Calif., May 19, 2014 /PRNewswire/ -- In Nexusguard's 2014 Preview, they predicted DDoS attacks would become increasingly "crafty" (more creative and difficult to mitigate) and cost-effective (requiring less resources). While their expectations of significant growth in application layer attacks have been realized, the spike in volumetric attacks was particularly noteworthy. Photo - http://photos.prnewswire.com/prnh/20140516/88458 A record-breaking attack - which exploited...

2014-05-16 23:06:34

Rapidsoft Systems is responsible for sale, installation, integration and support of advanced security systems designed for homeland and critical infrastructure security. Princeton, NJ (PRWEB) May 16, 2014 Rapidsoft Systems expands its partnership with Defentect Inc, the maker of DM3 threat awareness system for monitoring and detecting CBRNE threats. Rapidsoft systems will distribute Defentect's security solutions worldwide. These systems can integrate many kind of advanced sensors to...

2014-05-15 23:07:54

The newest CIS-CAT version achieves Security Content Automation Protocol (SCAP) 1.2 validation from the National Institute of Standards and Technology. East Greenbush, N.Y. (PRWEB) May 15, 2014 The Center for Internet Security (CIS) today announced the release of an enhanced version of its CIS Configuration Assessment Tool, known as CIS-CAT. CIS-CAT 3.0 will provide CIS Security Benchmarks members with increased capabilities, including the ability to perform software vulnerability...

2014-05-15 23:07:41

Steve Garritano hired as VP of Engineering at fast-growing cybersecurity firm. Charleston, SC (PRWEB) May 15, 2014 PhishLabs, the leading provider of cybercrime protection and intelligence services that fight back against online threats, announces the hire of Steve Garritano as VP of Engineering. In this role, Mr. Garritano is responsible for the research and development of PhishLabs’ cybercrime protection and intelligence technology. Prior to joining PhishLabs, Mr. Garritano served as...


Word of the Day
cruet
  • A vial or small glass bottle, especially one for holding vinegar, oil, etc.; a caster for liquids.
This word is Middle English in origin, and ultimately comes from the Old French, diminutive of 'crue,' flask.
Related