Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security

You are using the plain HTML view, switch to advanced view for a more complete experience.

7 criteria for data encryption
Industry VoiceWhen securing sensitive data and information for cloud storage or file transfer, one of the biggest mistakes is simply not following best practices.
Automating incident response lets IDT take battle to the enemy

Two years ago, attackers had Newark-based telecom and payments provider IDT Corp. pinned down.

Security staffers had their hands full dealing with a constant inflow of attacks against the company's infrastructure.

Sorting out real attacks from false positives, cleaning up malware, and ensuring that infections didn't spread could take hours -- or longer -- for a single incident. Meanwhile, every additional minute that an infected machine stayed on the network was that much more opportunity for the attackers to bury themselves deep or to make lateral jumps to other machines.

By automating the incident response process, IDT was able to reduce the time before the infection was quarantined, shorten the remediation cycle, reduce investigation time, and free up security staff to go after the bad guys themselves.

To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, May 5
Cisco prepares to swap CEO... Google may face more scrutiny in Europe... Vint Cerf doesn't trust back doors... and more tech news
Savvius Selects Procera Networks for Network Traffic Visibility and Napatech for Performance Acceleration

Procera Networks, Inc. LogoFREMONT, Calif., May 5, 2015 /PRNewswire/ -- Procera Networks, Inc. (NASDAQ: PKT), the global Subscriber Experience company, today announced that its Network Application Visibility Library (NAVL) has been selected by Savvius, a leading provider of network analytics and performance...


CNIT Entered Into Strategic Agreement with the $1.6 Billion Shenzhen Capital Group

SHENZHEN, China, May 5, 2015 /PRNewswire/ -- China Information Technology, Inc. (the "Company" or "CNIT") (Nasdaq GS: CNIT), a leading provider of integrated cloud-based platform, exchange, and big data solutions in China, today announced that it has entered into a strategic agreement...


We need the Internet police now more than ever

Many years ago I received spam from a woman I did not know. It was the type of spam where I could tell that her computer was compromised by a bot. That is, the spammer wasn't simply using her email address and sending the email from somewhere else. With the best of intentions I emailed her to let her know I was an Internet security professional, and I had received a spam email from her computer indicating it was actively infected. I told her what to do to clean it.

Her reply was very defensive and went something like this: "I'm tired of you people accusing me of sending out viruses and infecting my machine. If you don't stop emailing me I'm going to report you to the Internet police!" I calmly replied that I was a good guy trying to help. But she said she had reported me to the Internet police and I was surely to be arrested soon.

To read this article in full or to leave a comment, please click here

Poll says Canadians want transparency, oversight and privacy protection from government
Results released in CJFE's annual Review of Free Expression in Canada TORONTO, May 5, 2015 /CNW/ - 2014 marked a new low for freedom of expression in Canada, according to Canadian Journalists f...
FireEye offers new details on customer liability shields under the SAFETY Act

Note: This post is an update / follow-up to the original story, which is located here.

On Friday, Salted Hash explored the announcement from FireEye that their customers now have a liability shield due to being certified by the Department of Homeland Security (DHS) under the SAFETY Act.

FireEye says that customers using their Multi-Vector Virtual Execution engine and Dynamic Threat Intelligence platform will see "potential savings on both insurance and legal expenses" due to the protections afforded by the SAFETY Act, which will last until April 30, 2020.

To read this article in full or to leave a comment, please click here

FireEye offers new details on customer liability shields under the SAFETY Act

Note: This post is an update / follow-up to the original story, which is located here.

On Friday, Salted Hash explored the announcement from FireEye that their customers now have a liability shield due to being certified by the Department of Homeland Security (DHS) under the SAFETY Act.

FireEye says that customers using their Multi-Vector Virtual Execution engine and Dynamic Threat Intelligence platform will see "potential savings on both insurance and legal expenses" due to the protections afforded by the SAFETY Act, which will last until April 30, 2020.

To read this article in full or to leave a comment, please click here

Post Selected Items to:

Showing 10 items of about 9000

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2015 NewsKnowledge