Saturday, 25 de April de 2015

Noticias y opinión en Seguridad informática


New patent for encryption key generation method

(hace 5 years, 5 months) | Seguir leyendo

Free Microsoft security tool locks down buggy apps

No assembly required

(hace 5 years, 5 months) | Seguir leyendo

Symantec bakes DRM control into data protection

DLP software offers third party encryption security

(hace 5 years, 5 months) | Seguir leyendo

Nebulas Solutions offers clients managed security services from SecureWorks

(hace 5 years, 5 months) | Seguir leyendo

Consumer Electronics Can Help Improve Patient Health

(hace 5 years, 5 months) | Seguir leyendo

Thales and Brocade team up on encryption

New partnership sees integration of key products

(hace 5 years, 5 months) | Seguir leyendo

SAP and Nokia set up anti-piracy company

Tech giants combine products to form Original1

(hace 5 years, 5 months) | Seguir leyendo

US-CERT warns about free BlackBerry spyware app

(hace 5 years, 5 months) | Seguir leyendo

Cisco Buys Cloud-Based Security Company

(hace 5 years, 5 months) | Seguir leyendo

Trend Micro unveils new version of Deep Security software

To secure physical, virtualised and cloud-based servers

(hace 5 years, 6 months) | Seguir leyendo

Avalanche the most prolific phishing group of 2009

(hace 5 years, 6 months) | Seguir leyendo

Augmented reality's time is coming thanks to smarter smartphones

(hace 5 years, 6 months) | Seguir leyendo

Data Masking Secures Sensitive Data in Non-Production Environments

Sensitive data is a part of every large organization\'s normal business practice. Allowing sensitive data from production applications to be copied and used for development and testing environments increases the potential for theft, loss or exposure -- thus increasing the organization\'s risk. Data masking is emerging as a best practice for obfuscating real data so it can be safely used in non-production environments. This helps organizations meet compliance requirements for PCI, HIPAA, GLBA and other data privacy regulations.

(hace 5 years, 6 months) | Seguir leyendo

Fake antivirus makes security vendors look bad: Trend Micro

"The antivirus industry sucks," says Trend Micro CEO

(hace 5 years, 6 months) | Seguir leyendo

In Depth: Botnets: who's behind them and why?

Cisco boffins infiltrate a botnet to find out about online crime

(hace 5 years, 6 months) | Seguir leyendo

A lack of convergence could lead to data breaches

(hace 5 years, 6 months) | Seguir leyendo

Wikis leave holes for cross-site scripting attacks

(hace 5 years, 6 months) | Seguir leyendo

El Parlamento Europeo pretende endurecer la legislación contra el P2P

(hace 5 years, 6 months) | Seguir leyendo

IBM Takes Aim at EMC, HDS with New Storage System

(hace 5 years, 6 months) | Seguir leyendo

Microsoft wants ISO security certification for its Cloud services

(hace 5 years, 6 months) | Seguir leyendo