IDC expects that China's IT security appliance market will grow 14.7% to US$950 million in 2013; and this figure will reach US$1.56 billion by 2017, with a 2012-2017 CAGR of 13.5%. According to IDC, China's IT security appliance market ...
IBM is to acquire security firm Trusteer, whose software aims to help protect organisations against financial fraud and advanced security threats. Financial terms were not disclosed. Further reading IBM acquires cloud computing firm CSL ...
Tags: IBM, Financial Security
Some of the biggest technology, telecommunications and security firms will share cyber threat intelligence with the government to help increase the security of the defence supply chain, as part of a new government scheme. The scheme ...
Tags: Computer Products, software
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect ...
Indian outsourcing and services company Infosys has teamed up with Queen's University Belfast to conduct joint research into the global cyber security threat. The partnership brings together Queen's University Belfast's Centre for Secure ...
Tags: Computer Products, Computer
According to the latest market research conducted by the InfoWatch Group, Saudi Arabia is expected to invest up to $400 million in data loss prevention (DLP) over the next five years. Saudi Arabia is the Arab world’s largest ...
Tags: Infowatch, Data Loss Prevention
Wi-Fi hotspots are spreading at a record pace. As of February 18, 2013, the Wi-Fi Alliance Wi-Fi Finder registry contained 816,810 Wi-Fi hotspots in 145 countries, topped by South Korea, the U.K. and the U.S. As this industry matures, it ...
Tags: Consumer Electronics, Electronics
The government's spy agency, GCHQ, has launched an Academic Research Institute to investigate new ways of automatically analysing software to reduce its vulnerability to cyber threats. It is the second institute focused on cyber security ...
Tags: GCHQ, economy, Cyber Research
A U.S. government computer vulnerability database and several other websites at the National Institute of Standards and Technology have been down for nearly a week after workers there found malware on two Web servers. NIST's National ...
Singapore will allow US officials to inspect the work of a research institute linked to a Chinese telecoms firm which Washington suspects of espionage, the foreign ministry said on Thursday. K. Shanmugam, the foreign minister, told ...
Tags: Singapore, Huawei, telecoms firm
Cyberattacks are near the top of the list of most serious threats facing the U.S., with the rivaling concerns about terrorism and North Korea, intelligence officials with President Barack Obama's administration said. James Clapper, the ...
Tags: cyberattack, private networks, networks
Every day new applications appear on the world's mobile communications networks and user behaviour keeps adapting to new ways of streaming video, sharing files and communicating. New business demands, such as traffic monetisation, must ...
Tags: mobile communications networks, streaming video, sharing files
On 1st March 2013 the Southern African Clothing and Textile Workers’ Union (SACTWU) will have a Day of Action in Cape Town. This will take place on the second day of SACTWU’s annual Bargaining Conference. The Day of Action ...
Tags: SACTWU, Day of Action, Clothing and Textile
Cyber attacks in the UK cost the country up to 27bn each year. A report by the National Audit Office warned that the IT skills shortage in Britain could make it vulnerable against cyber attacks for the next 20 years. The UK suffered ...
Tags: UK, Cyber attacks, cyber security
Constant Guard Mobile Helps Protect Xfinity Internet Customers While They Browse, Shop and Bank Online On-The-Go To address growing security threats to consumers’ mobile devices, today Comcast announced it has launched Constant ...
Tags: Mobile devices, Constant Guard Mobile, security threats