Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Threat prevention provider FireEye, and Splunk, the recently gone public provider of software that helps organizations gather and make use of machine data from multiple sources, today announced the availability of Splunk for FireEye, an application that makes information on inbound and outbound events from

TOKYO - (AFP) - Asian mobile carriers look set to cash in on the iPhone 5 and its superfast speeds, but the model is not the game-changer that Apple needs if it is to remain top of the heap, analysts said Thursday. The phone's use of Long-Term Evolution (LTE) wireless technology will allow carriers to increase their charges and boost profits as existing users download more content and smartphone non-converts are tempted to take the plunge.

Perimeter E-Security, a provider of cloud and messaging security services, today launched a Mac OS X version of their SaaS Web Security solution. The solution allows organizations to enforce acceptable use policies, reduce security risks and curb abuse of network bandwidth for users of Mac OS X systems, giving employees the same levels of protection whether they are operating a Mac or PC.

What differentiates security and privacy? What unites them? Are they mutually exclusive or highly compatible? Does your organization’s policy on privacy trump its security policy? Are there policies in place for one or the other or both? Have you revisited them lately? If not -- as the saying goes -- there is no time like the present.

Messaging security firm Cloudmark today announced Cloudmark Mobile Platform 3.0, the latest edition of its messaging security solution for mobile network operators.Cloudmark Mobile Platform 3.0 provides real-time visibility and control of mobile messaging threats originating from internal or external networks and delivers the policy controls and scalability to help operators stop threats before they impact mobile networks and subscribers, the company said.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

CISO Strategy

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.