Enterprise security managers have yet another worry to add to their list: cyberwarfare attacks. Now, in addition to guarding against targeted attacks from cybercriminals and activists, enterprise security managers must increasingly guard ...
Concurrency, Inc., the 2012 Microsoft Central Region Partner of the Year, announced today that employees Nathan Lasnoski, Shannon Fritz, and Annur Sumar have each been awarded "Most Valuable Professional" status by Microsoft Corporation. Of ...
Tags: Concurrency, Microsoft, company news
Once vehemently opposed to open-source software, Microsoft has warmed to the development model over the years and will now take the unusual step of incorporating an open-source program developed by Linus Torvalds into its own development ...
Results from CIO's annual 'State of the CIO' survey, now in its 12th year, finds more CIOs optimistic about prospects for both their businesses and industries in the year ahead. State of the CIO However, many IT executives continue to ...
Tags: CIOs, IT executives, IT industry, market IT
Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday. Agency employees ...
Tags: US, computer security, IT industry, NASA
New Team at GoldKey Tackles Enterprise Security Challenges with Custom-Designed Solutions GoldKey Security Corporation today announced the creation of a GoldKey Special Problems Team. The team was organized to assist enterprise customers ...
Tags: GoldKey, Computer Products, Security, Special Problems
With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. And so they should. According to our research, more than three-quarters of the Forbes ...
Tags: cyber attacks, hacker, Internet, network
Less than 5% of the top 40 antivirus systems are able to detect previously non-cataloged viruses initially, a study has revealed. A test by security firm Imperva, which used more than 80 previously non-catalogued viruses, showed that many ...
Tags: antivirus systems, Enterprise security, Antivirus solutions
Hewlett-Packard has agreed to transfer 3,000 of its employees to General Motors, as the automaker moves IT operations in-house, the two companies announced. The HP workers are part of a team running GM's IT operations under outsourcing ...
Tags: GM, HP, IT Workers, IT operations
BlackBerry maker Research In Motion (RIM) has announced that its yet-to-be-launched BlackBerry 10 platform has been awarded the US government’s FIPS 140-2 security certification. The Federal Information Processing Standard ...
Tags: Blackberry, Consumer Electronics, US
SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
McAfee does not want to be all things to all people when it comes to security, but its leadership is aiming to provide the platform that will enable better data protection. "We believe in doing more business with fewer value-add partners, ...
Tags: McAfee, software development kits, application program interfaces
The Ghost Shell group, an offshoot of the Anonymous hacking collective has published the log-in details from 1.6 million accounts. The credentials were stolen from a series of hack attacks on Nasa, the FBI, the European Space Agency and ...
EMC said today it has agreed to buy privately-held start-up Silver Tail Systems, a vendor of real-time web session intelligence and behavioural analysis. EMC plans to use the purchase to beef up its RSA security division in the rapidly ...
Tags: EMC, Silver Tail, web intelligence, Silver Tail Systems
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE