Help Net Security
CCloud: Backup and sharing for Windows and Android
Comodo released a new edition of CCloud, a Windows client and a new CCloud app for Android. The Windows client now allows users to select the local drive letter that accesses …
Security main reason for stalled next generation data centre deployments
New survey results from Crossbeam identify network security as the number one reason IT organizations are stalled in their efforts to transition to cost- and energy-efficient …
Kaspersky PURE 2.0 Total Security released
Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection – …
Appliance for large-scale surveillance environments
Pivot3 announced the expansion of its vSTAC Watch product line with the introduction of the vSTAC Watch Enterprise, an enterprise-class Serverless Computing solution that …
AuthenTec combines fingerprint security with Symantec VIP
AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …
Next Level Security Systems releases mobile apps
Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …
Cisco and Lumos Networks prepare fiber infrastructure for 100G network
Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …
Open source audit plug-in for MySQL
McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …
New cloud disaster recovery service
EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …
Exploiting legitimate online technology
Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …
Data center industry dynamics
While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …
Microsoft disrupts massive cybercrime operation
In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility