UL recently announced the release of a new framework for certifying the resiliency of network and data center products. UL 2825 marks the first deliverable in response to recently introduced U.S. legislation requiring independent certification of network and security-related product performance and protection.
Nelson is an advertising and marketing professional with a diverse background that includes experience in both the business-to-business (B2B) and business-to-consumer B2C realms.
LIGATT Security International has appointed recently retired FBI Special Agent Gregory Scott as the company's newest chairman for of its board of directors.
Mobile Application Development (M.A.D.) Partners LLC and MainNerve are collaborating to provide iPhone, iPad and smartphone security and compliance to the critical healthcare sector.
Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot, the first Internet security service company. The top time thieves are updating software and hardware, reimaging infected machines, and enforcing end user Internet and e-mail policies.
Dell announced that it has closed its acquisition of SecureWorks Inc., a provider of information security services and expanding Dell’s IT-as-a-service offerings.
McAfee Inc. recently released the McAfee Threats Report: Fourth Quarter 2010, revealing a steady growth of threats to mobile platforms.
The program consists of a partnership of technology vendors committed to arming mutual customers with integrated solutions that fundamentally improve network security and risk management for enterprises.
An executive with more than 15 years of leadership experience in the high-tech industry, Santelices will lead a team focused on scaling Webroot's growth through relationships with strategic technology partners.
MacCallum, who reports directly to Pivot3 CEO Bob Fernander, has more than 25 years of experience in information technology. As vice president of engineering, she will drive product strategy and development of the Pivot3 suite of storage appliances.
The Maryland Cyber Challenge and Conference (MDC3), to be held Oct. 21-22, will strengthen Maryland's position as a cybersecurity leader by bringing teams of current and prospective cybersecurity professionals together to develop the skills and techniques needed to protect vital information systems.
The main goal of the report is to support governmental bodies in taking informed, risk-based decisions regarding security of data, resilience of service and legal compliance on their way to the cloud. It also highlights security and resilience pros and cons of community, private and public cloud computing services for public bodies.
Jonathan Buckley was named midmarket vice president, and Roger Oberg was named vice president of marketing for Ping Identity.
GFI Software, an IT solutions provider for small and medium-sized enterprises, recently revealed continuing high levels of rogue security products circulating during January, and a surge in malware that takes aim at vulnerabilities within Adobe Reader and the .pdf file format -- two of the top 10 detections are aimed at exploiting holes within Adobe.
Blue Coat Systems Inc. has introduced the Blue Coat Cloud Service, a scalable Internet-delivered service that leverages Blue Coat technology and the company’s WebPulse community of more than 70 million users.
Joe Sullivan, Facebook's chief security officer, has joined the National Cyber Security Alliance's board of directors. The organization is a nonprofit public-private partnership focused on cybersecurity awareness and education for all digital citizens.
Codebench Inc., a provider of TWIC / HSPD-12 / FIPS-201 authentication software, has integrated its PIVCheck Plus software with the Pinnacle access control software from Sielox, offering federal agencies and other organizations a fully compliant HSPD-12 solution.
SAIC will provide IT services in support of network-centric operations under the NETCENTS-2 Enterprise Integration and Services Management contract.
The National Institute of Standards and Technology has issued the final version of its recommendations for securely configuring and using full computing virtualization technologies.
The acquisition agreement between Trend Micro and Mobile Armor expands Trend Micro's data protection portfolio, extending its encryption offerings to span from endpoints all the way into the public cloud.