Secure Your Branch Offices Using Sophos RED – Video

Secure Your Branch Offices Using Sophos RED – Video

An appliance that can be easily set up even by non-technical staff

ZenithSecure Launches World’s Most Secure Database Solution

ZenithSecure Launches World’s Most Secure Database Solution

ZenithVault comes in three versions: Freeware, Enterprise and SaaS

Third Annual Oil and Gas Cyber Security Conference to Take Place in November

Third Annual Oil and Gas Cyber Security Conference to Take Place in November

GDF Suez, Shell, US Energy Security Council and others will take part

Globecomm Launches Cyber Security Solutions Service Cytelics

Globecomm Launches Cyber Security Solutions Service Cytelics

The new service is designed to secure organizations that use ICS

Arbor Networks Adds Customized Network Tuning to Pravail DDOS Mitigation Solution

Arbor Networks Adds Customized Network Tuning to Pravail DDOS Mitigation Solution

The product has also been enhanced with two other features

Most IT Security Pros Believe Cyber-Attacks Are More Dangerous than Physical Attacks

Most IT Security Pros Believe Cyber-Attacks Are More Dangerous than Physical Attacks

Cyber-Ark has released its Global Advanced Threat Landscape Survey

Frost & Sullivan: You Might Have Been Hacked, but You Don’t Know It Yet

Frost & Sullivan: You Might Have Been Hacked, but You Don’t Know It Yet

The company has published a market insight on cyber attacks and their consequences

Pure Hacking Launches Social Media Pentesting and Security Review Service

Pure Hacking Launches Social Media Pentesting and Security Review Service

The service is designed to help organizations address social media-related concerns

Barracuda Adds High-Performance Interfaces to Web Filter 1010 / 1011 Appliances

Barracuda Adds High-Performance Interfaces to Web Filter 1010 / 1011 Appliances

The enhanced models are available immediately worldwide

Trustwave Launches SIEM Software for Enterprises

Trustwave Launches SIEM Software for Enterprises

The solution can protect organizations against both internal and external threats

Risk I/O Enhances Vulnerability Intelligence Platform with Real-Time Attack Data

Risk I/O Enhances Vulnerability Intelligence Platform with Real-Time Attack Data

Organizations can use the platform to find out where they are most likely to be hit

69% of US Small Businesses Aren’t Concerned About the Impact of a Data Breach

69% of US Small Businesses Aren’t Concerned About the Impact of a Data Breach

Shred-it has released an interesting study on the implementation of security programs

Major US Financial Institutions to Take Part in Quantum Dawn 2 Cyber Exercise

Major US Financial Institutions to Take Part in Quantum Dawn 2 Cyber Exercise

Over 50 organizations are expected to take part in the drill

Experts: When Dealing with a Breach, Don’t Assume the Attacker Is Unsophisticated

Experts: When Dealing with a Breach, Don’t Assume the Attacker Is Unsophisticated

Bit9's Marc Bleicher explains how incident response teams should contain a breach

F-Secure’s DeepGuard 5 Improved with Exploit Interception Capabilities

F-Secure’s DeepGuard 5 Improved with Exploit Interception Capabilities

Exploit attempts are identified and blocked before any damage is caused

Study: 35% of Organizations Say They’re Capable of Quickly Detecting a Security Breach

Study: 35% of Organizations Say They’re Capable of Quickly Detecting a Security Breach

McAfee has released a report called “Needle in a Datastack”

73% of Firms Take Proactive and Reactive Measures to Protect Against DDOS Attacks

73% of Firms Take Proactive and Reactive Measures to Protect Against DDOS Attacks

AT&T publishes Business Continuity Study for 2013

 
Want more? Browse: