Please turn on your JavaScript for this page to function normally.
Real-time identity alerts reduce fraud losses

Experian announced Precise IDSM Personal Protection Alerts, a product that notifies individuals in real time that their personal information is being used in an authentication …

Profiling modern hackers: Hacktivists, criminals, and cyber spies

Sun Tzu, the renowned military strategist and author of The Art of War, was known for the saying, “Know thy enemy and known thyself, and you will not be imperiled in a …

Migration and monitoring of Microsoft environments

Dell Software announced a series of new enhancements designed to help organizations optimize the migration, management and monitoring of Microsoft environments. Dell Software …

The social smart lock of the future

Today at the D: All Things Digital conference, designer Yves Behar and technology entrepreneur Jason Johnson launched the August Smart Lock. The intuitive new lock and access …

Automate your way out of patching hell

IT departments are often criticised for their remoteness from the business. One cause could be highlighted by recent research numbers from IDC, which found that as much as 70 …

GFI Software buys online backup vendor IASO

GFI Software acquired the online backup software company IASO, based in The Netherlands. IASO provides cloud-based solutions that provide customers with secure backup and …

Liberty Reserve laundered $6 billion through illegal transactions

An indictment has been unsealed on Tuesday charging Liberty Reserve, a company that operated one of the world’s most widely used digital currency services, and seven of …

Addonics releases CipherUSB family of hardware encryption solutions

Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …

McAfee unveils Complete Endpoint Protection suites

McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …

Backup large data with Big Cloud

Sterling Data Storage released its largest data backup solution yet — the Big Cloud. It was designed for companies needing to securely store large amounts without sacrificing …

How secure is quantum cryptography?

Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …

DNS anomaly detection: Defend against sophisticated malware

Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …

Don't miss

Cybersecurity news