Cloud Computing

The dawn of ransomwear: How ransomware could move to wearable devices
Symantec has released new research that reveals ransomware attackers could also have wearables and other…

LogRhythm Extends Holistic Threat Analytics Suite with Endpoint Behavioural Anomaly Detection
Provides Visibility Into Endpoints and User Accounts Compromised by Advanced Threat Actors – Enabling Faster…

HP Advances Network Security with Comprehensive Threat Protection System
Actionable threat intelligence, enhanced visibility and analytics help enterprises protect against cyberattacks HP has introduced a…

AirPay Enables Secure and Frictionless Mobile Experience for Garena Using CyberSource Solutions
AirPay partners with CyberSource to heighten payment security and enable frictionless mobile checkout experience for…
BSA| The Software Alliance Settles Seven Unlicensed Software Cases in Australia totalling $147,000
BSA| The Software Alliance (BSA) has settled seven cases of illegal software usage in Australia…

AUSTRALIAN RESEARCH: Attitudes towards breaches and data theft highlight role of law and penalties
IT security professionals weigh in on ideal punishment for serious data breaches Websense, Inc. a…

UL completely automates payment brand terminal testing
UL is proud to introduce a new revolutionary module to automate payment terminal brand certification…

Blue Coat launches Endpoint Alliance Ecosystem
Provides customers with comprehensive end-to-end security solution Blue Coat Systems, Inc., a market leader in…
Cisco’s Recommendations to the Australian Prime Minister & Cabinet’s 2015 Cyber Security Review
Australia’s transition towards a more digitally-enabled economy will drive economic progress, improve social wellbeing, and…

Blue Coat Acquires Perspecsys to Effectively Make Public Cloud Applications Private
Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data…

Autonomous Weapons: an Open Letter from AI & Robotics Researchers
Autonomous weapons select and engage targets without human intervention. They might include, for example, armed…

Cisco Midyear Security Report Reveals Sophisticated Cyberattacks Are Defining the Innovation Race between Adversaries and Defenders
Findings underscore the need for retrospective analysis to reduce Time to Detection The Cisco 2015…
Arbor Networks’ ATLAS Data Shows the Average DDoS Attack Size Increasing
Arbor Networks Inc. , a leading provider of DDoS and advanced threat protection solutions for enterprise…

Award-Winning WatchGuard Dimension Changes Set the Bar for Network Security Visibility
Sleeker interface, role-based controls, and new management features make it easier and more intuitive for…