Security News - Page 17

Bitdefender Launches Anti-Theft System For PCs, Android Devices

Bitdefender Launches Anti-Theft System For PCs, Android Devices

.

Confound thieves by locking the phone tight, pinpointing it on a map, or wiping its data.

United Bank Of India Sets Up Security Operation Centre

United Bank Of India Sets Up Security Operation Centre

.

It will be the command centre for countering cyber threats and ensure compliance of the bank's security policy.

Security Appliance Shipments Up 12.9% In 1Q12

Security Appliance Shipments Up 12.9% In 1Q12

.

Security products are expanding rapidly into small, fast-growing geographies where demand is greater than ever, says IDC.

Security Measures Shouldn't Constrain The Employee

Security Measures Shouldn't Constrain The Employee

.

Ensuring a secured state while providing flexible work options to mobile employees and partners is paramount in the BFSI industry, says Sandeep Phanasgaonkar, President and CTO, Reliance Capital.

LinkedIn Boosts Privacy Drive

LinkedIn Boosts Privacy Drive

.

Recent high-profile data lapses have highlighted the difficulties for web giants and regulators alike of protecting consumer data.

Decoding Tata Teleservices' Security Ops Centre

Decoding Tata Teleservices' Security Ops Centre

.

Ashish Pachory, CIO - Tata Teleservices elaborates on the rationale and the functioning of its Security Operation Centre.

More Than 90% Indian SMEs Unprepared For Disasters

More Than 90% Indian SMEs Unprepared For Disasters

.

Lack of resources, budgets and general awareness holding down the adoption of disaster preparedness in Indian SMEs, says Symantec.

Information Costs Businesses $1.1Trillion: Symantec

Information Costs Businesses $1.1Trillion: Symantec

.

Symantec survey reveals that digital information makes up 49 percent of an organisation's total value.

Employee File Sharing Behaviour Exposes SMEs To Risk

Employee File Sharing Behaviour Exposes SMEs To Risk

.

Symantec survey reveals that SME employees are increasingly adopting unmanaged, personal-use online file sharing solutions without permission from IT.

New Bank Theft Software Hits Three Continents: Researchers

New Bank Theft Software Hits Three Continents: Researchers

.

Automated hacking of online bank accounts might have stolen $78 million in the past year from customers in Europe, Latin America and the United States.

Risk Mgmt More Critical Than Security Mgmt

Risk Mgmt More Critical Than Security Mgmt

.

Satish Das, CSO, Cognizant, reveals how, in the times of cloud and social media, it is more important to manage risk than ever before.

Trend Micro Protects Windows Environments From Zero Day Threats

Trend Micro Protects Windows Environments From Zero Day Threats

.

Trend Micro Deep Security and OfficeScan Intrusion Defense Firewall provide the vulnerability shielding required to protect Windows environments from zero-day threats.

"Flame" Can Sabotage Computers, Attack Iran: Expert

"Flame" Can Sabotage Computers, Attack Iran: Expert

.

Flame allows operators to delete files from computers, which means it can cause critical programs to fail or completely disable operating systems.

Faster, Higher, Stronger: Olympics Security Risks

Faster, Higher, Stronger: Olympics Security Risks

.

Websense Security Labs shares some of the cyber-scams associated with the 2012 Summer Olympic Games in London.

Defenx Starts India Ops

Defenx Starts India Ops

.

Defenx is the maker of popular anti-virus, Internet security and smartphone security solutions.

65% Targeted Attacks Driven By Financial Fraud

65% Targeted Attacks Driven By Financial Fraud

.

Successful attacks cost businesses over $100,000 per incident, says Check Point survey.

P&G Selects MetricStream's GRC Solution

P&G Selects MetricStream's GRC Solution

.

MetricStream's integrated GRC solution will be used across nearly 80 countries to consolidate and streamline Procter & Gamble's GRC initiatives.

Online Bank-Theft Software Grows More Sophisticated

Online Bank-Theft Software Grows More Sophisticated

.

Researchers say some variants of malicious software can now transfer money out automatically, without a hackers supervision.

ISACA's CISM, CRISC Among Highest-Paying IT Certifications

ISACA's CISM, CRISC Among Highest-Paying IT Certifications

.

CISM and CRISC named two of the highest-paying IT certifications in Foote Partners' IT Skills and Certifications Pay Index.

Hacked Cos Fight Back With Controversial Steps

Hacked Cos Fight Back With Controversial Steps

.

Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action.

AMD Strengthens Security Solutions Through ARM Alliance

AMD Strengthens Security Solutions Through ARM Alliance

.

Collaboration to extend ARM TrustZone security technology into x86-based AMD offerings.

Four Phases To Guard Plant Control System Networks From Cyber Threats

Four Phases To Guard Plant Control System Networks From Cyber Threats

.

Vendor-neutral technology and services required to assess, remediate, maintain and manage plant automation network performance, vulnerabilities and cyber security measures.

Websense Positioned As Leader In Magic Quadrant For Secure Web Gateway

Websense Positioned As Leader In Magic Quadrant For Secure Web Gateway

.

Vendors in the Magic Quadrant are evaluated based on their completeness of vision and ability to execute.

Bitdefender Releases Tool to Eradicate Flamer Espionage Weapon

Bitdefender Releases Tool to Eradicate Flamer Espionage Weapon

.

Bitdefender, global antivirus company has released a tool to find and remove the complex, dangerous spy tool Flamer attack toolkit.

McAfee Enhances Cloud Security Platform

McAfee Enhances Cloud Security Platform

.

The McAfee Cloud Security Platform helps businesses build a secure bridge to the Cloud.

BYOD Top Concern For Enterprise Mobile Security: Gartner

BYOD Top Concern For Enterprise Mobile Security: Gartner

.

Rapid proliferation of consumer mobile devices is high priority shows Gartner's survey, making BYOD a major security concern.

Multiple Attack Vectors Make A Sound Case For UTM: Frost & Sullivan

Multiple Attack Vectors Make A Sound Case For UTM: Frost & Sullivan

.

Unified threat management (UTM) integrates multiple security tools into a single network appliance, enabling businesses to deploy enterprise-grade security without the complexity and costs associated with multiple point products.

First Advantage, Pitney Bowes Collaborate To Prevent Fraud In BGV Industry

First Advantage, Pitney Bowes Collaborate To Prevent Fraud In BGV Industry

.

First Advantage will collaborate with Pitney Bowes to secure employment documents at the point of origin.

Information Services Group Launches Cloud Security Assessment

Information Services Group Launches Cloud Security Assessment

.

The ISG Cloud Security Assessment will be based on standards and guidelines defined by the Cloud Security Alliance.

Was LinkedIn A Sitting Duck With No CIO Or CISO?

Was LinkedIn A Sitting Duck With No CIO Or CISO?

.

Security experts say the company's data security practices were not as sophisticated as one would typically expect from a major Internet company.