In Q1 More Countries Suffered Botnet Attacks Cybercriminals in Q1 2015 carried out more than 23,000 botnet-assisted DDoS attacks on web resources located in 76...
Decline in detected malware attacks in organisations coincides perfectly with weekends New research published earlier this week in the annual NTT 2015 Global Threat Intelligence...
New HP Security offerings focus on securing interactions between users, applications and data HP has unveiled a number of security solutions targeting the modern day...
The VENOM vulnerability (CVE-2015-3456) could expose VMs to unauthorized access and data theft. But is it really “bigger than Heartbleed?” Touted to be bigger than...
Says will leverage HP Fortify to further help customers manage and reduce security risk SAP will resell HP Fortify application security software as part of...
Honeywell’s Cyber Security Risk Manager Gives Industrial Users Real-Time Visibility Honeywell Process Solutions (HPS) launched the first digital dashboard designed to proactively monitor, measure and...
Unlike traditional IT-driven identity solutions, RSA Via technology is driven by business needs RSA launched the RSA Via family of Smart Identity solutions, engineered to...
Launches Satatya Samas and Cosec Arc Matrix has introduced two innovative solutions in Video Surveillance and Access Control domain respectively. In video surveillance domain it...
With PerfectStorm 100GbE, customers can now test carrier core, data center core During the 2015 RSA Conference, Ixia will demonstrate the PerfectStorm 100GbE, the industry’s...
Enterprises across transportation, communications and energy experience a five-time increase in targeted attacks in 2014 Symantec’s Internet Security Threat Report (ISTR), Volume 20 exposes a...