Following the news that A Los Angeles school has made a US $28,000 ransomware payment after hackers raided its network. Attackers had encrypted enough to ruin computer services, email, and messaging at the Los Angeles Community College District. Jonathan Sander, VP of Product Strategy at Lieberman Software commented below. Jonathan Sander, VP of Product Strategy at […]
Company Extends Industry Lead with Most Comprehensive Support for Large, Complex Networks FireMon, the global leader in Network Security Policy Management (NSPM), today confirmed its intention to support Check Point R80 security management. It is the latest addition to the list of supported technologies that also includes Cisco, F5 Networks, Fortinet, Intel Security (McAfee), Juniper, […]
HID Global Is First To Enable End-To-End Identity And Access Management For Both Physical And IT Security
News Highlights: Customers with higher security requirements now have a complete solution from one supplier that gives users a single, secure credential for accessing doors, IT systems, networks and data. New HID PIV solution spans the full range of identity proofing and lifecycle management capabilities to establish, create, use, and manage secure credentials with a […]
E-Sports Entertainment Association (ESEA), one of the largest competitive video gaming communities on the planet, was hacked last December. As a result, a database containing 1.5 million player profiles was compromised. IT security experts from Tripwire, ESET and Positive Technologies comment below. . Tyler Reguly, Manager of Software Development at Tripwire: “There is a lot of money […]
Think Your Online Content Is Yours? Think Again. They Can Read Your Passwords, Travel Plans, Ideas And Everything Else.
Following the news that hosting website 123-reg has been hit by yet another distributed denial of service (DDoS) attack, Stephanie Weagle, VP at Corero Network Security commented below. Stephanie Weagle, VP at Corero Network Security: “Hosting providers are at increased risk for DDoS attacks impacting their network environment and their hosted tenants, due to the number of […]