Quantcast

Latest Secure communication Stories

2014-02-20 23:29:23

Experts warn that serious cybercrime will continue to escalate in 2014 as hackers are becoming increasingly more skilled. Businesses need to protect their infrastructure and the National Center for Systems Security and Information Assurance (CSSIA) can help. Palos Hills, IL (PRWEB) February 20, 2014 Don’t be fooled… if it can happen to Target & Niemen Marcus, it could happen to any business. Experts warn that serious cybercrime will continue to escalate in 2014 as hackers are...

2014-02-19 12:32:46

-- Application Encryption compliments existing Transparent Encryption Offering - SAN JOSE, Calif., Feb. 19, 2014 /PRNewswire/ -- Vormetric, the leader in enterprise data security for physical, virtual and cloud environments, today announced the expansion of their data protection products with a new solution, Vormetric Application Encryption. This new offering extends the Vormetric Data Security Platform with powerful capabilities for encrypting data within enterprise and web applications, as...

2014-02-19 12:26:10

2013 Data breaches exposed over 822 million records nearly doubling the previous record high, according to Risk Based Security RICHMOND, Va., Feb. 19, 2014 /PRNewswire-iReach/ -- According to Risk Based Security, www.riskbasedsecurity.com, 2013 broke the previous all-time record for the number of exposed records caused by reported data breach incidents. The 2,164 incidents reported during 2013 exposed over 822 million records, nearly doubling the previous highest year on record...

2014-02-18 08:39:55

-- More than 575 million data records lost or stolen in 2013 - BALTIMORE, Feb. 18, 2014 /PRNewswire/ -- SafeNet, Inc., a global leader in data protection solutions, has launched a new website that catalogs data breaches as they happen, and provides a methodology for security professionals to score the severity of breaches and see where they rank among publicly disclosed breaches. The SafeNet Breach Level Index (BLI) provides a centralized global database of breaches and calculates the...

2014-02-12 08:34:16

New Private SSL Certificates enable continued internal use of non-registered domain names DALLAS, Feb. 12, 2014 /PRNewswire/ -- The use of non-fully qualified domain names (FQDN) in publically trusted certificates is being deprecated by November 1, 2015, and existing certificates containing non-FQDNs will be revoked by all public certification authorities by October 1, 2016. To help simplify this change, Entrust, Inc. introduces Private SSL Certificates that provide organizations an...

2014-02-11 23:27:48

Target and Neiman Marcus are among the most recent and well-known cybersecurity breach victims reported. Computerbilities warns businesses that it’s not a matter of if your network will be breached, but when a breach will occur. Raleigh, NC (PRWEB) February 11, 2014 North Carolina IT company, Computerbilities Inc., is sharing important business tips in the wake of the recent data breaches at Target and Neiman Marcus. Recent revelations find the malware attacks affected millions of...

2014-02-11 23:02:23

Physical Network Security Solution Provides More Protection, at a Fraction the Cost San Diego, CA (PRWEB) February 11, 2014 Trusted Systems, Inc. (http://www.trustedsys.com), the leading manufacturer of physical security solutions for classified data networks, is demonstrating Trusted Layer Zero™, the industry’s first integrated physical security infrastructure from the user to the cloud. Trusted Layer Zero, is being shown at the AFCEA West Conference and Expo, Feb. 11-13, in San...

2014-02-10 23:21:48

Security Leader to Provide Advice on Identifying and Fixing Compromised Systems Portland, OR (PRWEB) February 10, 2014 Tripwire, Inc., a global provider of risk-based security and compliance management solutions, today announced a new webinar entitled How to Restore Trust After a Data Breach. While many organizations take preventive methods to reduce the risk of data breaches, even the most prepared establishments are still at risk. The moments following a breach are crucial,...

2014-02-07 12:21:33

Secures electric utility networks and systems RIDGEFIELD, Conn., Feb. 7, 2014 /PRNewswire/ -- Owl Computing Technologies, Inc., a network security solutions provider, is pleased to announce the deployment of Owl's Enterprise Perimeter Defense Solution (EPDS) in the fossil fired electric power plants of a major electric utility company in the United States. The company implemented the Owl perimeter defense solutions to adopt best practices that mitigate cybersecurity vulnerabilities...

2014-02-05 08:29:28

Company issues 4th annual report analyzing breaches of protected health information (PHI). Cites 138% increase in large PHI data breaches in 2013; calls out lack of encryption of laptops as major contributing factor. CARPINTERIA, Calif., Feb. 5, 2014 /PRNewswire/ -- Redspin, Inc., a leading provider of penetration testing and IT security assessments, today released its annual Breach Report 2013 - Protected Health Information. In the report, Redspin provides in-depth analysis of the...


Word of the Day
blee
  • Color; hue; complexion.
This word is Middle English in origin.
Related