Increasing confidence in the economy and a rising stock market could lay the groundwork for a revival in tech-sector mergers and acquisitions as companies embrace cloud technology and pursue game-changing software, particularly for the ...
Tags: Wall Street
Intel-owned security software vendor McAfee is to acquire Finnish firewall software maker Stonesoft in a $389m (£250m) cash deal. The deal, subject to the agreement of Helsinki Stock Exchange-listed Stonesoft's shareholders, will ...
Tags: Stonesof, Computer Products
McAfee plans to acquire Stonesoft, a Helsinki-based maker of firewalls, for US$389 million in cash, the companies said Monday. The Intel subsidiary said firewalls are one of the fastest growing products in network security, which it plans ...
Tags: McAfee, Stonesoft, Computer Products
The recent attack on computer networks at broadcasting organisations and banks in South Korea has brought cyber war into the limelight. While the cause of the attacks remains unknown, South Korean authorities say they "do not rule out the ...
Tags: Computer Products, Networks
The Home Office has announced a plan to bring together the skills of the police, industry experts and academics in a Cyber Crime Reduction Partnership (CCRP) to help to stamp out cyber-crime. Security minister James Brokenshire announced ...
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
The UK is to offer around 100 18-year-olds training in advanced IT skills to bolster the expertise of intelligence agencies in fighting cyber crime. The scheme was announced by foreign secretary William Hague during a visit to Bletchley ...
Tags: UK, GCHQ, cyber crime, training, advanced IT skills, 18-year-olds
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
Hacktivist group Anonymous claims it brought down government websites in protest at the UK’s handling of the asylum case of WikiLeaks founder Julian Assange. The group targeted the websites of No. 10, the Home Office, the Ministry ...
Tags: Anonymous, Computer Products, Government Websites, Julian Assange
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft A number of high-profile technology companies have set 6 June as the date for turning on the protocol and make ...
Tags: IPv6 security, Stonesoft, software, IPv6 traffic
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
Many organisations continue to rely on ineffective intrusion prevention systems (IPS) for defending information systems, says security firm Stonesoft. Advanced evasion techniques (AETs) – which combine several known evasion ...
Lack of security in the cyber world is one of the most significant threats faced by the civilized world, according to Jarno Limnell, director of cyber security at security firm Stonesoft. "But it seems that we have to experience a ...
Tags: lack of security, cyber world, cyber security, digital resources
Network World - NSS Labs, which tests security products, today introduced what it's calling the "Security Value Map," a graphical evaluation of security gear based on the relative merit of each product's technical and cost advantage. The ...
Tags: Security, Equipment, Protection