Cloud Security Alliance Recommends the Cloud Security Readiness Tool
Offers Enterprises a Simple Way to Evaluate IT Potential and Learn how to Adopt Cloud ServicesSEATTLE, WA (PRWEB) January 17, 2013The Cloud Security Alliance (CSA) recommends theCloud Security...
View ArticleKoolSpan Solution Addresses New Guidelines for Mobile Security from National...
KoolSpan’s TrustChip Provides a Higher Degree of Assurance Against ThreatsKoolSpan has been building hardware-based mobile security solutions since 2007.Millions of devices in use today carry sensitive...
View ArticleElliptic Technologies Introduces New Multi-Protocol Security Engine to...
emonstration at Mobile World Congress 2013 in Barcelona, SpainElliptic TechnologiesThe SPP-330 Security Engine is a versatile security solution that allows SoC manufacturers to efficiently balance...
View ArticleDell’s Mobile Clinical Computing Solution Provides Significant Savings While...
Tallahassee Memorial HealthCare achieves a risk-adjusted return on investment of 83 percent and a payback period of just 13 monthsTime saved allows each physician to see an additional patient per...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (22) ==r15181 864989...
View ArticleAre you going to LegalTech?
AccessData is!We hope to see you at the E-Discovery industry’s biggest eventbecause we have a lot to share with you! Please stop by ourbooth #1401 on the mezzanine level for:A sneak peek of Summation...
View ArticleHTTP 2.0 Negotiation
Abstract This document describes an Upgrade-based protocol negotiation proposal for HTTP 2.0.1. Introduction User agents interact with numerous servers from different domains using different...
View Article10 Evil User Tricks for Bypassing Anti-Virus
Many anti-virus solutions are deployed with weak configurations that provide end users with the ability to quickly disable or work around the product if they wish. As a result, even users without super...
View ArticleCase Study: Pro-active Log Review Might Be A Good Idea
With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security...
View ArticleUS-CERT Current Activity - Adobe Releases Security Update for ColdFusion
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1National Cyber Awareness SystemUS-CERT Current ActivityAdobe Releases Security Update for ColdFusionOriginal release date: January 17, 2013Last revised:...
View ArticleScientists expose new vulnerabilities in the security of personal genetic...
CAMBRIDGE, Mass. (January 17, 2013) – Using only a computer, an Internet connection, and publicly accessible online resources, a team of Whitehead Institute researchers has been able to identify nearly...
View ArticleEurope Weighs Requiring Firms to Disclose Data Breaches
BERLIN — To combat a rise in cybercrime, the European Commission is considering a plan to require companies that store data on the Internet — like Microsoft, Apple, Google and I.B.M. — to report the...
View ArticleTenable Webcast: The Politics of Stakeholders within the CISO world
Please Join UsWebcast: The Politics of Stakeholders within the CISO worldHello everybody,I wanted to let you know about two webcasts we have upcoming this month:January 31 at 2PM EST: "The Politics of...
View ArticleWebinar: What You Don't Know CAN Hurt You... Over 90% of Cyber Security...
LIVE WEBINARCyber Intelligence & Response TechnologyWhat You Don't Know CAN Hurt You...Over 90% of Cyber Security Incidents Go Undetected for Weeks, Even Months.By Then, the Damage is Done.The...
View ArticleOne Hundred Zaxby Chiken Fast-Food Restaurants Contain Suspicious Malware Files
Dear Guests, Zaxby’s Franchising, Inc. and our licensees take the security of our guests’ information very seriously and we want to inform you of an incident affecting the security of...
View ArticleToday's Slew Of NIST CVE Issuance's For Vulns In Specview, GE Intelligent...
Click on the underlined CVE for additional vuln specific infoCVE-2012-5972Summary: Directory traversal vulnerability in the web server in SpecView 2.5 build 853 and earlier allows remote attackers to...
View ArticleASAP Systems Announces New Advanced Features for Its Web-Based Inventory...
ASAP BarCloud Emerging as Leading Cloud Computing Software for Companies That Need to Track Stock Inventory and Capital AssetsSAN JOSE, CA--(Marketwire - Jan 17, 2013) - ASAP Systems, a market leader...
View ArticleNew rule protects patient privacy, secures health information
Enhanced standards improve privacy protections and security safeguards for consumer health dataWASHINGTON--(BUSINESS WIRE)--The U.S. Department of Health and Human Services (HHS) moved forward today to...
View ArticlePECO Urges Customers to Be Aware of Utility Scam
PHILADELPHIA--(BUSINESS WIRE)--PECO is urging customers to be aware of a scam that continues to target customers in the Philadelphia area. The scam, which has been reportedly taking place throughout...
View ArticleApplication Security, Inc.’s TeamSHATTER Discovers Ten Database-Related...
Researchers Urge Oracle Customers to Patch High-Risk Vulnerabilities that Leave Databases Open to AttackNEW YORK--(BUSINESS WIRE)--Application Security, Inc. (AppSecInc), the leading provider of...
View Article