Hi, what are you looking for?
Sophos has completed its acquisition of network security vendor Astaro, a deal that will enable Sophos to deliver endpoint protection combined with Unified Threat Management solutions.The acquisition, which was announced on May 6, 2011, will enable Sophos to:
The second quarter of 2011 was one of the worst on record in terms of successful hacks and breaches of organizations including RSA, the U.S. Defense Department, the
Oracle Virtual Desktop Client App for iPad Brings Highly Secure and Mobile Access to Virtual Desktops and Enterprise Applications Oracle today announced the availability of Oracle Virtual Desktop Client App for iPad that enables secure access to virtual desktops managed by Oracle's Sun Ray Software and Oracle Virtual Desktop Infrastructure.
In a talk at last year’s EuroSecWest conference, researcher Andrei Costin presented several vulnerabilities he found within commercial printers.
Last month, the FBI announced that violent crime rates had fallen dramatically in 2010 despite a tough economy. The Wall Street Journal explained this seemingly counterintuitive situation away with a list of factors. But none of those factors seem to have caused a drop in cyber-crime, as the Verizon Data Breach Investigations Report (DBIR) showed. All this poses a question – can we apply any of these factors to reduce the rate of cyber-crime?
Adrian Ghighina, 33, of Bucharest, Romania, was sentenced to 48 months in prison last week by U.S. District Judge Matthew F. Kennelly in Chicago after he pleaded guilty in February 2011 to one count each of wire fraud and conspiracy.
Domain name registrar and Web hosting provider GoDaddy, announced it has agreed to receive a strategic investment from private equity firms KKR, Silver Lake and Technology Crossover Ventures.The terms of the transaction were not disclosed, but the Wall Street Journal reported people familiar with the deal saying it could be worth approximately $2.25 billion. Its likely that founder Bob Parsons has cashed out a large chunk of his shares in the company, and kept a minority stake.
With all the daily reports on how companies are experiencing security breaches in their networks, it would appear hackers are taking over. Since January of this year, those in the security business believe that hacking big companies is now in the norm. NASDAQ, HP, Sony and governments agencies, as examples, are not weathering hacker intrusions any better.
Unlike my daughter’s second grade piano review, sincerity in the world of secure web application development means very little. Development of secure Web applications and the effort to maintain their security is hard work, requiring a holistic approach and a long-term perspective that web application is essential. Security is not achieved by simply demanding it of your staff; you need the correct staff to demand it of, continuous manual and automated vulnerability testing, and code reviews by security experts.
Cybercriminals Favoring Targeted Attacks over Mass SpamIn a continuing trend, new research released by Cisco today further confirms that cybercriminals have made a fundamental shift in strategy, abandoning traditional mass spam attacks in favor of personalized attacks with a greater financial impact on targeted organizations.
Lockheed Martin, the largest provider of IT services, systems integration, and training to the U.S.
CA Technologies announced it would acquire ITKO (Interactive TKO, Inc.), a provider of simulation solutions that help organizations optimize the development and testing of composite and cloud-based applications, for $330 million in cash.
On April 19, 2011, Sony experienced a nightmare of a security breach. What began with a few Sony PlayStation Network (PSN) servers unexpectedly rebooting themselves has resulted in a blemishing of the Sony brand and the loss of some major bucks.
Strategies and Best Practices for Deploying a Load Balancer for Email
Kaspersky Lab, in its most recent spam report for May 2011, revealed that across its user base, Russia has taken the number one position in terms of the quantity of malware detected in emails by antivirus software. According to Kaspersky’s data, Russia overtook the United States, where the quantity of malware infected emails received fell by 3.5 percent. The most widespread malware distributed via email was the Trojan-Spy program Trojan-Spy.HTML.Fraud.gen.
Symantec this week published "A Window Into Mobile Device Security: Examining the security approaches employed in Apple's iOS and Google's Android", an in-depth, technical evaluation of Apple's iOS and Google's Android mobile platforms, to help organizations understand the security risks of deploying these devices in the enterprise.