Introducing Breakthrough Isla™ Web Malware Isolation System, Eliminating All Malware Attacks Delivered Through Web Browsers


Isla appliances work transparently with all modern browsers, securing local and remote users on all platforms, including Windows, OSX, Linux, Android, iOS, and Blackberry Spikes Security, the isolation security company, today introduced the Isla family of web malware isolation appliances, designed for all businesses that want complete protection against malware delivered through web browsers. Isla […]

Wireless Networks are the Weak Link In Security Chain

According to a May 2015 global survey of IT decision makers (ITDMs), wireless networks are a significant source of risk and vulnerability for their organizations. Among US respondents, in fact (as with their global counterparts), more ITDMs identified wireless networks as the most vulnerable part of the enterprise than any other component. Wireless networks have […]

Encryption keys Stolen Via Radio

In light of the news that Israeli-based security researchers have devised a way to steal encryption keys stored on a PC using an AM radio antenna, please find comment below from Kevin Bocek, Vice President of Security Strategy and Threat Intelligence at Venafi. Kevin Bocek, Vice President of Security Strategy and Threat Intelligence at Venafi “Cybercriminals are always looking to […]

Exposing Underground Cybercrime Economy Triggering Surge in Malicious Macros

Expose Underground Cybercrime

Leader in advanced threat protection uncovers the cybercriminal ecosystem supporting the recent rise of malicious macros, providing new insight on economic and technical drivers Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation security and compliance company, announces the release of a report that exposes the economic and technical drivers behind the recent worldwide surge of malicious […]

Web Application Firewall Streamline On-Premises Central Management

Web Application Firewall

Latest Version Includes Support for SAML and JSON Payload Inspection With the latest version of Barracuda Web Application Firewall, version 8.0, Barracuda released support for the latest enhancements to Barracuda Control Server, its on-premises platform for central management, to further streamline the management of product updates, shared policies, and services across multiple clusters and data […]

Recognized as #1 in Payment Innovation by ABI Research

payment innovation by ABI Research

Oberthur Technologies (OT), a world leader in digital security solutions for the mobility space, scored number 1 position for innovation in the payment sector in ABI Research’s Payment & Banking Card Technologies competitive assessment. OT’s strong innovative strategy and products such as its revolutionary OT Motion Code™ – the world-first dynamic cryptogram solution – and […]

Reveal Top Cyber Threat Trends in 2015 Financial Services Drill-Down Report

Financial services businesses encounter security incidents 300 percent more frequently than other industries Raytheon|Websense, a global leader in protecting organisations from the latest cyber attacks and data theft,  announced the release of the Websense Security Labs™ 2015 Financial Services Drill-Down Report examining the current state of cyber threats and data-stealing attacks against financial services institutions (FS). The research […]

Issued Patent Covering Determination of Whether a Data Storage is Encrypted

Data Storage is Encrypted

New Technology Enhances OPSWAT’s Gears and OESIS Framework Solutions OPSWAT, a software company that provides solutions to secure and manage IT infrastructure, announced that the United States Patent and Trademark Office has issued US Patent 9,021,163 entitled Determining Whether a Data Storage is Encrypted.  Inventors are Benjamin Czarny (CEO, OPSWAT), Jianpeng Mo (Director of Software […]

Hackers Behavior Before and During the 2015 Copa America

Copa America

Intro Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTA enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geopolitical region, […]