Beauty and The Breach: Leaked Credentials in Context Michael Marriott, Digital Shadows security expert Our most recent research paper looks at credential compromise, finding more than 5 million leaked credentials online for the world’s biggest 1,000 organizations. Of course, not all breached data…
Dell Unveils its Best Mobile Thin Clients Yet with Enterprise-Class Performance and Security
Dell Unveils its Best Mobile Thin Clients Yet with Enterprise-Class Performance and Security · Dell Latitude E7270 mobile thin client is the world’s most powerful mobile thin client, designed for processing-intensive applications · Dell Latitude 3460 mobile thin client combines security and…
Gemalto and Valeo Partner to Turn Your Smartphone into a Secure Car Key
Gemalto and Valeo Partner to Turn Your Smartphone into a Secure Car Key Paris and Amsterdam, Sept 21, 2016 – (ACN Newswire) – Valeo (Euonext: FR), one of the world’s leading automotive suppliers, has partnered with Gemalto (Euronext NL0000400653 GTO), the world…
Gemalto Releases Findings of First Half 2016 Breach Level Index
Gemalto Releases Findings of First Half 2016 Breach Level Index – Data breaches up 15% and compromised data records up 31% compared to previous six months – Identity and personal data theft account for 64% of all data breaches –…
McAfee Labs Report ‘Follows the Money’ to Assess Criminal Operations Behind Hospital Ransomware
McAfee Labs Report ‘Follows the Money’ to Assess Criminal Operations Behind Hospital Ransomware Investigation Tracks Hospital Ransomware Payments Through Bitcoin Accounts; Ransomware, Mobile, and Macro Malware Threats Surge in Q2 2016 NEWS HIGHLIGHTS Intel Security tracks $100,000 in targeted hospital…
HACKTIVISM, IT’S NOT ALL DOSING AROUND
“It is important not to discount the impact of hacktivists on your infrastructure. But by monitoring hacktivist activity, it’s possible to gain a better appreciation of the day-to-day claims and avoid missing something that could potentially become more damaging,’ said…
Trend Micro Protects Personal Data and Priceless Files with Enhanced Security Software
Trend Micro Protects Personal Data and Priceless Files with Enhanced Security Software Singapore, September 14, 2016 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, has today reaffirmed its commitment to providing security and peace-of-mind to…
Hitachi Targets $6 Billion Video Security and Monitoring Market With New Video Management Platform Models and Strategic Partnerships
Hitachi Targets $6 Billion Video Security and Monitoring Market With New Video Management Platform Models and Strategic Partnerships Company Teams With Industry Leaders Milestone Systems and OnSSI to Validate and Deliver Robust Video Monitoring and Security Solutions Singapore – September…
BMC Launches New Capabilities for BladeLogic Threat Director to Identify Security Blind Spots and Expand Coverage of Data Centers
BMC Launches New Capabilities for BladeLogic Threat Director to Identify Security Blind Spots and Expand Coverage of Data Centers Action-focused solution offers first-ever security view of operational blind spots, and accelerates ability to prioritize and remediate network vulnerabilities. SINGAPORE– September 9, 2016 – BMC, the global leader in IT solutions for…
Hillstone Networks is Positioned in the Gartner’s 2016 Unified Threat Management Magic Quadrant for Third Consecutive Year
Hillstone Networks is Positioned in the Gartner’s 2016 Unified Threat Management Magic Quadrant for Third Consecutive Year Hillstone delivers the right solutions for security-conscious SMB organizations SINGAPORE, 8 September, 2016 – Hillstone Networks, a leading provider of network security solutions, today announced…
Top 5 Trends in Secure Identity
Top 5 Trends in Secure Identity By Alex Tan, Director of Sales, Physical Access Control System, HID Global, ASEAN The integration of wearable technology into our society is bigger than we have ever imagined. The global wearable technology market alone is…
HP Introduces World’s Only Notebooks with Integrated Privacy Screens
HP Introduces World’s Only Notebooks with Integrated Privacy Screens Innovative HP Sure View technology helps combat visual hacking, extends company’s leadership in security SINGAPORE., August 26, 2016 — HP Inc. today unveiled the world’s only PCs with integrated privacy screens[i]. HP…
Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams
Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams SINGAPORE, August 24, 2016 – As Trend Micro predicted, 2016 has proven to be a year of online extortion through various malicious attack methods. Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader…
Intel Security to expand mobile security technology to Samsung Galaxy Note7 and Tizen OS based Samsung Z2
Intel Security to expand mobile security technology to Samsung Galaxy Note7 and Tizen OS based Samsung Z2 · Samsung’s latest Galaxy Note and Tizen OS based Z2 smartphone will come pre-installed with McAfee® VirusScan® mobile security and anti-malware technology · New ransomware…