The evaluation was based on completeness of vision and ability to execute.
Fey to lead the charge on security management, technological innovation and next-generation products.
During a typical month 4.3 percent of endpoints become infected, which translates to an infection rate of 52.1 percent annually, finds Osterman Research.
The solution helps ensure mutual strong authentication between the bank and the end-user enabling an easy and transparent user login experience.
Passwords for online banking, social networks and email could be replaced with the wave of a hand if prototype technology developed by Intel makes it to tablets and laptops.
Worldwide spending on security is expected to rise to $60 billion in 2012, says Gartner.
Offerings include software for Cisco ASA and a DC-grade intrusion prevention system.
Implements NICE IP video surveillance solutions to address operational, safety and security needs.
By building a new email protocol, a team of computer scientists suggests that it is now possible to exchange emails with almost zero risk of interference from third parties.
Sporadic outages throughout the day were caused by "a series of internal network events" that corrupted data in the company's networking equipment.
The quadrant is based on an assessment of a company's ability to execute and completeness of vision.
Sophos Mobile Control as a Service allows businesses to quickly and easily deploy an MDM solution without any changes to their existing IT infrastructure.
Norton 360 Multi-Device is a comprehensive security solution that provides security across platforms and devices.
IP-based video security solution expands Fortinet's broad appliance portfolio in the fast growing global market.
The database is actively used in Kaspersky Lab's consumer and corporate products to provide security and efficiency for customers and is dynamically updated to keep track of new programs.
Google did not disclose the amount it paid, and did not respond to requests for comment.
Lawmakers failed this summer to overcome disputes over cyber security regulations for private firms such as utilities.
The term "Elderwood" comes from the exploit communication used in some of the attacks, targeted at manufacturers of defence components and NGOs.
Web applications remain the third most common attack vector overall, with hacking still on the increase, from organised criminal groups, amateurs and political activists.
Norton by Symantec has released the findings of its annual Norton Cybercrime Report, one of the global consumer cybercrime studies.
Mobile "drive-by downloads", use of Twitter for control of mobile botnets, and mobile "ransomware" are among the latest trends.
The upcoming new CGEIT job practice will align with COBIT 5, ISACA's framework for governance and management of enterprise IT.
In a message posted on Pastebin.com, hacker group AntiSec said it obtained a file with "a list of 12,367,232 Apple iOS devices.
New versions of FortiClient for Android and iOS platforms now available as part of end-to-end security solution.
First bank in India to process issuer transactions through Visa to offer superior protection for its customers through real-time detection and prevention of potential frauds.
Two-factor authentication includes an additional layer of security that uses two components to verify a user's identity instead of a standard password.
A total number of 201, 303, 308 and 273 government websites were hacked during the year 2009, 2010, 2011 and 2012 (till July) respectively.
Visa Advanced Authorization and Visa Risk Manager, offer financial institutions unprecedented levels of real time protection and responses across Visa's entire global network.
Global Managed Security Service Providers market earned revenues of $6.66 billion in 2011 and is estimated to reach $15.63 billion in 2016.
Oracle urged computer users to install the latest version of the program as soon as possible.