Quantcast

Latest Data security Stories

2014-05-20 08:22:12

Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase DULLES, Va., May 20, 2014 /PRNewswire/ -- Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a new report issued today by Raytheon Company (NYSE: RTN), people with access to privileged data - such as health care records, sensitive company information, intellectual...

2014-05-16 23:01:00

Altibase’s hybrid in-memory database (ALTIBASE HDB) is fighting the war on data breaches by redirecting perpetrators to easier prey. Unfortunately, there is no way to absolutely protect from data breaches; however, Altibase’s unique hybrid engine provides organizations with the tools to divert criminal attention to easier targets. New York, NY (PRWEB) May 16, 2014 Data security has always been a critical IT concern, but recent data breaches at giant organizations like Target as...

2014-05-15 23:02:13

Latest Buyer’s Guide Dedicated to Evaluating Security Information and Event Management Appliances as watchdogs in the hostile world of cybersecurity threats Austin, Texas (PRWEB) May 15, 2014 Large companies regularly issue warnings to customers that critical information may have been compromised. Each year, it seems that more supposedly secure companies are breached than the year before. When these events occur, it can take organizations several days, weeks or even longer to discover...

2014-05-15 08:41:54

Cloud optimism outweighs surveillance and breach concerns; strong confidence in data protection technologies SAN JOSE, Calif., May 15, 2014 /PRNewswire/ -- CipherCloud, the leader in cloud information protection, today announced the results of a cloud health check study. With the one year anniversary of the PRISM revelations approaching, CipherCloud gauged the attitudes and insights of attendees at the Infosecurity Europe 2014 conference. In light of EU regulatory discussions around stricter...

2014-05-15 00:23:15

BEIJING, May 15, 2014 /PRNewswire/ -- Pactera Technology International Ltd. ("Pactera" or the "Company"), a global consulting and technology services provider strategically headquartered in China, announces that Curtis E. Dalton has been appointed Chief Information Risk & Security Officer (CISO) and Senior Vice President. Mr. Dalton will report directly to Pactera Chief Executive Officer Tiak Koon Loh. http://photos.prnewswire.com/prnvar/20130118/CN37843LOGO As an advisor and IT...

2014-05-13 08:39:36

Unisys survey shows customer loyalty drops following data breaches involving personal or credit card data BLUE BELL, Pa., May 13, 2014 /PRNewswire/ -- Credit and debit card fraud tops Americans' security concerns in 2014, against a recent backdrop of major retail and banking security breaches, according to the 2014 Unisys Security Index released today by Unisys Corporation (NYSE: UIS) in partnership with Lieberman Research Group. This year, 59 percent of U.S. respondents are...

2014-05-12 23:04:22

Fresh off the launch of its first OS X® product, software development company Uniblue is pleased to announce the release of that particular product’s Windows® counterpart. (PRWEB) May 12, 2014 PC Mechanic is built on a very simple, yet effective principle: to fix and clean PCs. Starting by giving the PC a thorough scan, PC Mechanic then enables the user to make the most of four powerful features to get the maintenance process going: Fix Windows Registry Errors: PC Mechanic’s...

2014-05-12 12:34:47

WidePoint Will Use Wave's EMBASSY® Security Center and Cryptographic Service Provider (CSP) to Secure Digital Certificates within TPMs on Customer Devices MCLEAN, Va., May 12, 2014 /PRNewswire/ -- WidePoint Corporation (NYSE Mkt: WYY), a leading provider of secure, cloud-based, enterprise-wide Managed Mobility Services (MMS) featuring Cybersecurity and Telecommunications Lifecycle Management (TLM) solutions, and Wave Systems Corp. (NASDAQ: WAVX), the leading company for managing...

2014-05-09 23:02:05

Extensively researched and authored by compliance and I.T. personal, the information security policy manual – which is available for immediate download today from myinformationsecuritypolicy.com – contains literally dozens of essential policies and supporting forms for today’s complex and demanding small businesses. Dallas, TX (PRWEB) May 09, 2014 Extensively researched and authored by compliance and I.T. personal, the information security policy manual – which is available for...

2014-05-08 23:05:18

Security Congress Offers Global Speaker Line-up Covering More Than 80 Educational Sessions Across Nine Tracks for Over 20,000 Attendees Clearwater, FL, USA (PRWEB) May 08, 2014 (ISC)2® (“ISC-squared”), the largest not-for-profit membership body of certified information and software security professionals with over 100,000 members worldwide, today released the full education program and speaker line-up for its fourth annual Security Congress, taking place September 29 – October...


Word of the Day
Cthulhu
  • A gigantic fictional humanoid alien god being described with a head resembling an octopus and dragon wings and claws, around whom an insane cult developed.
  • Pertaining to the mythos of Cthulhu and additional otherworldly beings created by H. P. Lovecraft or inspired by his writings and imitators.
This word was invented in 1926 by H.P. Lovecraft for his short story, 'The Call of Cthulhu.' 'Cthulhu' may be based on the word 'chthonic,' which in Greek mythology refers to the underworld.
Related