Security
Palo Alto Networks to participate in World Economic Forum annual meeting in Davos
A global dialogue and cyber breach prevention mindset are key to the fourth industrial revolution…
Vormetric hardens Data Security Manager with Thales
Cloud and big data environments demand high assurance data centric security Thales and Vormetric have…
Cisco Annual Security Report Reveals a Decline in Defender Confidence and the Increased Impact of Industrialized Attackers
Businesses make strides in advancing security posture in the face of persistent attacks that take…
WatchGuard Announces New Secure Wireless Access Points so Customers Stay Safer Online
AP300 combines modern wireless features with award-winning security to better protect against network attacks WatchGuard…
BT Joins New Global Alliance Bringing Real Time Digital Insights From The Store And Across The Supply Chain
The Acuitas Digital Alliance is has launched by global technology leaders BT, Intel, NexGen Packaging,…
Android.Bankosy: All ears on voice call-based 2FA
Android.Bankosy gets updated to steal passwords sent through voice calls generated by 2FA systems. In…
90% of industries have patient data breaches, says Verizon 2015 Protected Health Information Data Breach Report
Stolen medical information is a much more widespread issue than previously thought, affecting 18 out…
Ixia announces first 50 Gigabit Ethernet (GbE) validation solution on a proven, field tested platform
Ixia Xcellon-Multis QSFP28 Interface Load Module optimises bandwidth, reduces expenses for customers with hyper-scale data…
Ascending the Ranks: The Brazilian Cybercriminal Underground in 2015
The Brazilian underground’s emergence can largely be attributed to an environment where quick returns at…
Forcepoint brings fresh approach to safeguarding users, data and networks from insider and outsider threats
@ForcePointsec announced as the new security brand with integration of Raytheon cyber products, Websense and acquisition…
IDV Solutions announces ActivistMap.com extension for Visual Command Center
IDV Solutions has launched an extension with the Sigma Group’s ActivistMap.com that will help command…
Akamai Identifies SEO Web Application Attack Campaign
Attackers use SQL injections to manipulate search engine rankings, impacting an organisation’s revenue and reputation…
Influx of fake Instagram profiles luring users to adult dating sites
Three fake Instagram profile variations used to earn scammers money through affiliate programs. In recent…
BT secures major cloud services contracts with the EU
New contracts create one of the largest government clouds in Europe and executes on BT’s…