US Air Force Wants to Enhance Its Cyber Warfare Capabilities

US Air Force Wants to Enhance Its Cyber Warfare Capabilities

These are the types of cyber weapons they require

Big Data Represents a Valuable Target for Cybercriminals, Microsoft Says

Big Data Represents a Valuable Target for Cybercriminals, Microsoft Says

Trustworhy Computing VP Scott Charney published an interesting whitepaper

Huawei to Australian Government: Cyber Security Law Is Discriminatory

Huawei to Australian Government: Cyber Security Law Is Discriminatory

The firm is discontent with the fact that they were banned from the NBN

Intel and VMware Technologies Combined to Secure Cloud Data

Intel and VMware Technologies Combined to Secure Cloud Data

Trusted Execution Technology (TXT) and vSphere 5.1 are put to good use

US General Admits to Have Used Cyber Weapons Against Afghanistan

US General Admits to Have Used Cyber Weapons Against Afghanistan

Marine Lt. Gen. Richard P. Mills talks about the importance of cyber

VirusBuster Technology Assigned Exclusively to Agnitum

VirusBuster Technology Assigned Exclusively to Agnitum

Current VirusBuster customers will receive an equivalent Outpost application

ENISA: Unreported Cybersecurity Incidents Bad for Consumers and Policymakers

ENISA: Unreported Cybersecurity Incidents Bad for Consumers and Policymakers

The agency hopes that current and proposed legislation can address the current gaps

British Retailers Lost Over £205M ($323M) to Cybercrime in 2011-2012

British Retailers Lost Over £205M ($323M) to Cybercrime in 2011-2012

Large losses are caused by the additional security measures implemented by companies

Solutionary Research: Using Contextual Security to Gain Actionable Intelligence

Solutionary Research: Using Contextual Security to Gain Actionable Intelligence

A study explains how MSSPs can maximize the effectiveness of security programs

DARPA Wants to Dominate Cyber Battlespace with Plan X

DARPA Wants to Dominate Cyber Battlespace with Plan X

The organization claims that they’re not developing cyber weapons

Cybercriminals to Israeli Firms: Pay Up or We Reveal Your Secrets

Cybercriminals to Israeli Firms: Pay Up or We Reveal Your Secrets

Extortion has becoming a serious issue for many companies

Actions of Non-State Hackers Have Implications on National Security, Experts Say

Actions of Non-State Hackers Have Implications on National Security, Experts Say

“Lone wolves” could ignite disputes between countries

NCC Acquires Intrepidus Group for $11M (€8.9M) in Cash

NCC Acquires Intrepidus Group for $11M (€8.9M) in Cash

This is the second security company acquired by NCC this month

Japan to Benefit from Trusteer Fraud Prevention and Endpoint Protection Systems

Japan to Benefit from Trusteer Fraud Prevention and Endpoint Protection Systems

The company has established operations in Japan and has put an industry veteran in charge

Ugandan Government Buffs Up Security After Hack on Prime Minister’s Office

Ugandan Government Buffs Up Security After Hack on Prime Minister’s Office

Organizations will be given everything they need to ensure that they're protected

Olympics Threatened by Cyberattack Before Opening Ceremony

Olympics Threatened by Cyberattack Before Opening Ceremony

Organizers rushed to ensure that backup systems were capable of handling the workload

Stonesoft Tackles AETs with “Evader” and First-Ever EPS

Stonesoft Tackles AETs with “Evader” and First-Ever EPS

The company launched a free tool that can be used to test security solutions

 
Want more? Browse: