Latest Zero day attack Stories
MILFORD, Conn., Jan. 14 /PRNewswire/ -- Perimeter E-Security, the trusted market leader of information security services that delivers enterprise-class protection and compliance to companies of all sizes, today unveiled its Top 10 Information Security Threats for 2010.
SUNNYVALE, Calif., Dec.
WALTHAM, Mass., Dec. 16 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, today unveiled its annual report on the top popular consumer applications with known vulnerabilities.
SUNNYVALE, Calif., Nov. 24 /PRNewswire/ -- Zscaler, Inc., the market leader in cloud-delivered multi-tenant Security as a Service (SaaS), today announced that it has deployed protections to protect customers against a new zero-day threat that affects Internet Explorer 6 & 7.
IT managers polled by Bit9 assert the need for greater protection against threats from unauthorized and malicious software WALTHAM, Mass., April 8 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, today announced the results of a survey on the ubiquity of unauthorized software in enterprise and government systems.
WALTHAM, Mass., March 4 /PRNewswire/ -- Bit9, Inc., the pioneer and leader in Enterprise Application Whitelisting, announced today that Bertucci's has chosen Bit9 Parity(TM) to proactively protect its restaurant systems from malware, data leakage and unauthorized software.
Brings Application Whitelisting Expertise to 1.6M U.S. Retailers WALTHAM, Mass., Feb.
Triumfant Resolution Manager Enables Users to Stop Unknown Desktop Threats and Remove All Remnants of an Attack ROCKVILLE, Md., Feb.
OTTAWA and RESTON, Va., Dec.
New research shows that Internet hackers are narrowing the time frame they need to unleash computer attacks that take advantage of publicly disclosed security holes.
- Sleep; the state or condition of being asleep.