Solution secures devices, supports compliance with flexible Full Disk Encryption and adds support for Mac.
McAfee Q4 Threats Report shows Malicious sites nearly double, while mobile malware continues to grow.
To secure iOS, Android, Mac OS X and Windows 7 mobile devices on any network.
As many as 27 websites of various departments of Andhra Pradesh were hacked, exposing the chinks in the state's cyber security.
Juniper Networks releases findings from its 2011 Mobile Threats Report.
Symantec Control Compliance Suite allows security leaders create a targeted view of IT risk as it relates to a specific business process, group or function.
Solution provides real-time web and data security on a scalable modular chassis with 10G interfaces for up to 100,000 users.
The malicious code, whose precise origin and authorship remain unconfirmed, made its way as early as 2009.
With the entry of multiple consumer devices into the previously standardised enterprise IT network, employees can work from everywhere - leading to an explosion of endpoints in the network.
Sameer Shelke, Co-founder, COO and CTO, Aujas Networks discusses the level of adoption of GRC tools in Indian companies.
Dr. Whitfield Diffie, Father of Public Key Encryption explains to Abhishek Raval and Revathi Raghavan, how companies lack in making the best use of existing tools and failure of 'confinement of processes'
GRC platform to improve risk-based decision-making capabilities.
Oracle rejected a potential $272 million award against SAP AG over copyright infringement allegations, opting for a new trial instead.
Plenty of work still has to be done before the industry can produce a comprehensive and dependable identity architecture for the modern world, says Gartner.
A new type of spam campaign using QR codes has been recently spotted, says ESET.
Internet companies and financial services firms develop a new approach to fighting email spam.
With the changing environment, IT Risk Management has become an indispensable and inherent aspect of the CIO job responsibility.
The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise.
ICSA Labs certifies BIG-IP Application Delivery Controllers to defend against DDoS and multilayer attacks.
Kaspersky Lab announced that it has officially been named a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms.
Dell DR4000 disk-to-disk backup storage platform helps reduce backup data by up to 15 times with deduplication and compression
Websense Security Labs has found that thousands of businesses are putting themselves at risk by revealing their email addresses on Twitter.
InfoWatch to protect intellectual property and guard against insider threats to confidential and sensitive data.
The partnership will result in integration of MetricStream IT-GRC Solution with QualysGuard Vulnerability Management
A hacker who goes by the name of 'Yama Tough' threatened on Saturday to release the full source code for Symantec's flagship Norton Antivirus software.
Sunil Gupta, Senior Vice President and Mobility Service Lines Head, Symphony Services advises CIOs on how to mitigate the security aspect in BYOD.
eScan report predicts Data Mining, Voice Mail Hacking and Social Engineering attacks will dominate in 2012.
Kaspersky Lab analyses the year gone by and predicts likely events and trends next year in the field of cybercriminal activities.
Kartik Shahani, Country Manager-India & SAARC, RSA, the Security Division of EMC, elaborates on CIO and CISO security priorities for 2012.
Rise in 'Legitimate' spam threats to mobile banking, virtual currency and embedded hardware expected in the coming year, says McAfee.