Blancco software supports safe disposal of PCs and servers while providing central repository of erasure reports for audit and enforcement of IT asset management policy.
Portland-headquartered ID Experts is single-point reference for all this state agencies' needs.
Ranking is based on fiscal year revenue growth; the company grew 496 percent from 2005-2009.
Theft of information and electronic data at global companies has overtaken physical theft for the first time, according to the latest edition of the Kroll Annual Global Fraud Report. This year’s study shows that the amount lost by businesses to fraud rose from $1.4 million to $1.7 million per billion dollars of sales in the past 12 months – an increase of more than 20 percent.
Augustine will direct Cyber Security Education at the company.
WhiteHat Security engineers improve enterprise website security with operational efficiency and threat intelligence.
On November 4 and 5, the National Institute of Standards and Technology (NIST) will host the Cloud Computing Forum and Workshop II to give government and industry stakeholders opportunity to comment on the next steps in developing cloud computing standards.
McAfee, Inc. recently released new research, finding that mid-sized organizations have seen increased attacks on their networks and systems since last year, according to the McAfee report The Security Paradox.
The online web service had over 205,128 people who performed vulnerability scans and out of those scans over 40,221 registered in a 4 day period.
Insecure Web browsers and the growing number of complex applets and browser plug-in applications are allowing malicious software to spread faster than ever on the Internet. Some websites are installing malicious code, such as spyware, on computers without the user’s knowledge or consent.
The Department of Homeland Security recently launched the “Stop. Think. Connect.” public cybersecurity awareness campaign -- a national initiative that promotes simple steps the public can take to increase their safety and security online.
During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on the Trend Micro semi-annual 2010 threat report, spam continued to grow between January and June 2010, with a brief lull during April.
As we go about our day, preoccupied with work, family, friends and activities, many of us have the luxury of never thinking about cyberwarfare. But know that right this second, more than 100 foreign intelligence organizations are trying to hack into our military networks. A scary thought, isn’t it? To defend our nation against this threat, the Pentagon is partnering with NATO allies and the private sector.
- By Sherleen Mahoney
- Oct 01, 2010
Citrix Systems Inc. recently announced key findings from a recently conducted survey on the impact of government cybersecurity measures on federal managers.
Most people in the industry are familiar with how the NVR has changed the face of security video projects worldwide. As security hardware professionals, you may have been asked, “Aren’t NVRs just servers?” or “Can we use one of our extra e-mail machines as an NVR?” You might answer with a reserved, “Yes, but....”
- By William Ferris
- Oct 01, 2010
PandaLabs, Panda Security's antimalware laboratory, recently published its Q3 Quarterly Report on global malware activity, covering security events and incidents from July to September. Continuing the theme from the last report, PandaLabs once again found Trojans in the spotlight, comprising 55 percent of all new threats. Infection via e-mail, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook "Like" button, fake Web pages positioned on search engines (BlackHat SEO) and zero-day vulnerability exploits.
Department of Homeland Security (DHS) Secretary Janet Napolitano recently announced the beginning of Cyber Storm III -- a three-day long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.
CDW LLC, a provider of technology solutions to business, government, education and healthcare, recentlyannounced the results of its Business Continuity Straw Poll, based on a survey of 200 Information Technology (IT) decision makers at medium and large U.S. businesses, each of which experienced significant network disruptions since July 2009.
Panda will train the Army's operational agents in the fight against cyber terrorism, digital crime and strategic preparation for cyber-warfare.
McAfee Inc. recently revealed that business leaders worldwide see the value of Web 2.0 in supporting productivity and driving new revenue -- but remain deeply concerned about security threats associated with deploying the technology.