Israeli Prime Minister Benjamin Netanyahu announced a bold initiative this week calling on tech giants and Western powers to band together to protect the world from cyber-attacks, vowing to relax export restrictions normally placed on ...
Tags: protect the world from cyber-attacks, cyber technology trade
Check Point has published its second mobile security report, revealing that 79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs. The report found mobile security incidents cost more ...
The company is the latest to be attacked after recent cyber attacks on Apple, Facebook and Twitter. Evernote's security team discovered suspicious activity in its network which attempted to access secure areas of its service. Evernote ...
Tags: cyber attack, Apple, Facebook, Twitter
US President Barack Obama has finally signed a much-anticipated executive order to protect key elements of the country's critical infrastructure against cyberattacks. Covering power plants, water utilities and other high-profile targets, ...
Tags: cyberattacks, infrastructure, Barack Obama
IDG News Service - Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate ...
Tags: Google certificate, Google, Microsoft, Internet
Palo Alto Networks Tuesday unveiled the first virtualized version of its next-generation firewall, server-based software intended to run on the VMware platform to allow security managers to set up firewall application-layer controls in ...
Tags: Palo Alto Networks, firewall, VM, USA, next-generation
Bolton NHS Foundation Trust has selected security management firm Wave Systems' Safend Encryptor to encrypt sensitive data and manage and recover data securely. Further reading NHS Trust fined £175,000 for 'entirely avoidable' ...
Tags: Bolton NHS Foundation Trust, security management firm, data securely
US space agency Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 employees and contractors. Until the encryption process is complete, staff members are forbidden ...
Tags: Nasa, mobile computer, personal information, encryption process
Crossbeam has been bought by private equity firm Thoma Bravo, opening up the door for the security company to expand its product line both in-house and via acquisitions. Known for its high-end X-Series hardware that supports software of ...
Tags: Blue Coat, BT, cloud, Crossbeam, Crossbeam bought
Check Point Software Technologies plans to introduce document security software that encrypts and controls access to files across an organization's various departments and also meets the growing need for corporate users to access company ...
Bolton NHS Foundation Trust has selected security management firm Wave Systems' Safend Encryptor to encrypt sensitive data and manage and recover data securely. Further reading NHS Trust fined £175,000 for 'entirely avoidable' ...
Tags: Bolton NHS, Mcafee, Safend, NHS Trust
HSBC has restored its online banking services after a distributed denial of service(DDoS)attack. HSBC said servers had come under a DDoS attack which affected HSBC websites around the world. The DDoS attack on HSBC did not affect any ...
Tags: HSBC, online banking services, distributed denial of service attack
The websites of several Swedish government agencies were knocked offline on Friday. The website failures coincided with threats by hacktivists, claiming to be members of the Anonymous collective, to launch a cyber attack against Swedish ...
Tags: Swedish government, hacktivists, Anonymous collective, cyber attack
Cloud computing,IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security. Analyst Gartner has predicted context-aware security will be the preferred method for IT to evolve enterprise security to ...
Tags: predicted context-aware security, Cloud computing, IT consumerisation
Network World - NSS Labs, which tests security products, today introduced what it's calling the "Security Value Map," a graphical evaluation of security gear based on the relative merit of each product's technical and cost advantage. The ...
Tags: Security, Equipment, Protection