- Security
- By Eduard Kovacs
- August 29th, 2012
US Air Force Wants to Enhance Its Cyber Warfare Capabilities
These are the types of cyber weapons they require
- Security
- By Eduard Kovacs
- August 29th, 2012
Big Data Represents a Valuable Target for Cybercriminals, Microsoft Says
Trustworhy Computing VP Scott Charney published an interesting whitepaper
- Security Blog
- By Eduard Kovacs
- August 28th, 2012
Huawei to Australian Government: Cyber Security Law Is Discriminatory
The firm is discontent with the fact that they were banned from the NBN
- Security
- By Eduard Kovacs
- August 28th, 2012
Intel and VMware Technologies Combined to Secure Cloud Data
Trusted Execution Technology (TXT) and vSphere 5.1 are put to good use
- Security
- By Eduard Kovacs
- August 28th, 2012
US General Admits to Have Used Cyber Weapons Against Afghanistan
Marine Lt. Gen. Richard P. Mills talks about the importance of cyber
- Security Blog
- By Eduard Kovacs
- August 27th, 2012
VirusBuster Technology Assigned Exclusively to Agnitum
Current VirusBuster customers will receive an equivalent Outpost application
- Advisories
- By Eduard Kovacs
- August 27th, 2012
ENISA: Unreported Cybersecurity Incidents Bad for Consumers and Policymakers
The agency hopes that current and proposed legislation can address the current gaps
- Security
- By Eduard Kovacs
- August 23rd, 2012
British Retailers Lost Over £205M ($323M) to Cybercrime in 2011-2012
Large losses are caused by the additional security measures implemented by companies
- Security Blog
- By Eduard Kovacs
- August 22nd, 2012
Solutionary Research: Using Contextual Security to Gain Actionable Intelligence
A study explains how MSSPs can maximize the effectiveness of security programs
- Security Blog
- By Eduard Kovacs
- August 22nd, 2012
DARPA Wants to Dominate Cyber Battlespace with Plan X
The organization claims that they’re not developing cyber weapons
- Security Fixes and Improvements
- By Eduard Kovacs
- August 21st, 2012
Cybercriminals to Israeli Firms: Pay Up or We Reveal Your Secrets
Extortion has becoming a serious issue for many companies
- Security
- By Eduard Kovacs
- August 21st, 2012
Actions of Non-State Hackers Have Implications on National Security, Experts Say
“Lone wolves” could ignite disputes between countries
- Security Blog
- By Eduard Kovacs
- August 20th, 2012
NCC Acquires Intrepidus Group for $11M (€8.9M) in Cash
This is the second security company acquired by NCC this month
- Security Blog
- By Eduard Kovacs
- August 18th, 2012
Japan to Benefit from Trusteer Fraud Prevention and Endpoint Protection Systems
The company has established operations in Japan and has put an industry veteran in charge
- Security Blog
- By Eduard Kovacs
- August 17th, 2012
Ugandan Government Buffs Up Security After Hack on Prime Minister’s Office
Organizations will be given everything they need to ensure that they're protected
- Security Blog
- By Eduard Kovacs
- August 17th, 2012
Olympics Threatened by Cyberattack Before Opening Ceremony
Organizers rushed to ensure that backup systems were capable of handling the workload
- Security Fixes and Improvements
- By Eduard Kovacs
- August 8th, 2012
Stonesoft Tackles AETs with “Evader” and First-Ever EPS
The company launched a free tool that can be used to test security solutions