Security News - Page 22
Novell Unveils Novell ZENworks 11 Support Pack 2
Solution secures devices, supports compliance with flexible Full Disk Encryption and adds support for Mac.
Malware Surpassed 75 Million Samples In 2011: McAfee
McAfee Q4 Threats Report shows Malicious sites nearly double, while mobile malware continues to grow.
Aruba Networks Unveils BYOD Security Solution
To secure iOS, Android, Mac OS X and Windows 7 mobile devices on any network.
Andhra Government Websites Hacked
As many as 27 websites of various departments of Andhra Pradesh were hacked, exposing the chinks in the state's cyber security.
Google Android Malware Jumped Over 3325% In 2011
Juniper Networks releases findings from its 2011 Mobile Threats Report.
Symantec Unveils GRC Solution
Symantec Control Compliance Suite allows security leaders create a targeted view of IT risk as it relates to a specific business process, group or function.
Websense Unveils X10G: Scalable Solution To Malware, DLP
Solution provides real-time web and data security on a scalable modular chassis with 10G interfaces for up to 100,000 users.
Iran Has 'Neutralised' Stuxnet Virus: Experts
The malicious code, whose precise origin and authorship remain unconfirmed, made its way as early as 2009.
In 2012, Get Smart About Endpoint Security
With the entry of multiple consumer devices into the previously standardised enterprise IT network, employees can work from everywhere - leading to an explosion of endpoints in the network.
GRC - The Indian Scenario
Sameer Shelke, Co-founder, COO and CTO, Aujas Networks discusses the level of adoption of GRC tools in Indian companies.
Lessons From Major Breach Events In 2011
Dr. Whitfield Diffie, Father of Public Key Encryption explains to Abhishek Raval and Revathi Raghavan, how companies lack in making the best use of existing tools and failure of 'confinement of processes'
PwC, MetricStream Ally To Integrate GRC Solutions
GRC platform to improve risk-based decision-making capabilities.
Oracle Seeks New Trial Against SAP Over Downloads
Oracle rejected a potential $272 million award against SAP AG over copyright infringement allegations, opting for a new trial instead.
Six Trends That Will Drive Evolution Of IAM, Privacy Mgmt In 2012
Plenty of work still has to be done before the industry can produce a comprehensive and dependable identity architecture for the modern world, says Gartner.
QR Codes By Marketers Can Attract Attacks On Smartphones
A new type of spam campaign using QR codes has been recently spotted, says ESET.
Banks, Internet Cos Team Up To Fight Spam
Internet companies and financial services firms develop a new approach to fighting email spam.
Proactiveness And Awareness Is Key To IT Security
With the changing environment, IT Risk Management has become an indispensable and inherent aspect of the CIO job responsibility.
McAfee Provides Complete Endpoint Security Through Whitelisting
The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise.
F5's Certified Firewall Protects Against Large-Scale Cyber Attacks
ICSA Labs certifies BIG-IP Application Delivery Controllers to defend against DDoS and multilayer attacks.
Kaspersky Lab Named Leader In Magic Quadrant for Endpoint Protection Platforms
Kaspersky Lab announced that it has officially been named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms.
Dell Unveils DR4000 - BC/DR Solution For SMEs
Dell DR4000 disk-to-disk backup storage platform helps reduce backup data by up to 15 times with deduplication and compression
Email Addresses Being Shared On Twitter, But Who Cares?
Websense Security Labs has found that thousands of businesses are putting themselves at risk by revealing their email addresses on Twitter.
Prime Focus Selects InfoWatch To Keep Intellectual Property Secure
InfoWatch to protect intellectual property and guard against insider threats to confidential and sensitive data.
MetricStream Partners With US-based Qualys
The partnership will result in integration of MetricStream IT-GRC Solution with QualysGuard Vulnerability Management
Hacker To Release Full Norton Antivirus Code
A hacker who goes by the name of 'Yama Tough' threatened on Saturday to release the full source code for Symantec's flagship Norton Antivirus software.
Managing Security On Smartphones Easier Than On Laptops
Sunil Gupta, Senior Vice President and Mobility Service Lines Head, Symphony Services advises CIOs on how to mitigate the security aspect in BYOD.
2012 Will See More Malware Camouflage: eScan
eScan report predicts Data Mining, Voice Mail Hacking and Social Engineering attacks will dominate in 2012.
Cyberthreat Forecast For 2012
Kaspersky Lab analyses the year gone by and predicts likely events and trends next year in the field of cybercriminal activities.
CIO And CISO Security Priorities For 2012
Kartik Shahani, Country Manager-India & SAARC, RSA, the Security Division of EMC, elaborates on CIO and CISO security priorities for 2012.
Threat Predictions For 2012
Rise in 'Legitimate' spam threats to mobile banking, virtual currency and embedded hardware expected in the coming year, says McAfee.