IBM Delivers Watson for Cyber Security to Power Cognitive Security Operations Centers · Over 40 Companies Across a Dozen Industries Tap Watson Security Technology · New Innovations Include Watson-Powered Chatbot & Voice-Powered Security Assistant…
Malwarebytes Acquires Saferbytes
Malwarebytes Acquires Saferbytes Malwarebytes acquires Italian cybersecurity firm to enhance threat detection, removal and remediation across the entire enterprise. SANTA CLARA, Calif. – February 8, 2017 – Malwarebytes™, the leading advanced malware prevention and remediation solution, announced the acquisition of Saferbytes, a security…
SonicWall Annual Threat Report Highlights Advances Made by Both Security Professionals and Cyber Criminals
SonicWall Annual Threat Report Highlights Advances Made by Both Security Professionals and Cyber Criminals · The volume of unique malware samples declined to 60 million, a 6.25 percent decrease. · Point-of-sale malware creation declined by 93 percent since 2014. · …
Trend Micro Positioned Highest and Furthest in the Leaders Quadrant for its Ability to Execute and Completeness of Vision in 2017 Gartner Magic Quadrant for Endpoint Protection Platforms
Trend Micro Positioned Highest and Furthest in the Leaders Quadrant for its Ability to Execute and Completeness of Vision in 2017 Gartner Magic Quadrant for Endpoint Protection Platforms SINGAPORE, February 7, 2017 –– Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity…
One in Five Computers in Singapore Reported a Malware Encounter in 2Q2016: Microsoft Report
One in Five Computers in Singapore Reported a Malware Encounter in 2Q2016: Microsoft Report According to findings from the Microsoft Security Intelligence Report, Volume 21, Asia Pacific’s emerging markets were also among the most vulnerable to malware threats SINGAPORE, 6…
Three DevOps Predictions for 2017 by CA Technologies
Three DevOps Predictions for 2017 by CA Technologies Continuous testing, security of code, and metrics pegged as hottest trends in DevOps this year SINGAPORE, 17 January, 2017 – CA Technologies (NASDAQ: CA) today announced three trends in DevOps it expects will come…
How to make sure your IoT devices are not stealing your personal data
With December being the favourite festive month and a brand new year approaching fast, everyone is busy shopping gifts for their loved ones – family, friends, and lovers. In the era of Internet of Things, smart devices are never left…
Fujitsu Launches Online Biometric Authentication Service with Total Support for Robust, FIDO-Compliant Security
Fujitsu Launches Online Biometric Authentication Service with Total Support for Robust, FIDO-Compliant Security TOKYO, Dec 21, 2016 – (JCN Newswire) – Fujitsu today announced that it will begin offering a new FIDO-compliant service for online biometric authentication. The “Online Biometric…
Punishing cybercriminals might be more effective than beefing up security systems
Punishing cybercriminals might be more effective than beefing up security systems Punishing cybercriminals might be more effective than beefing up security systems Jo-Ann Huang, freelance writer Illka Gobius, managing director, PINPOINT PR Cybercriminals need to face legal repercussions that…
10 Must-Have iOS Privacy & Security Apps for 2017
10 Must-Have iOS Privacy & Security Apps for 2017 NordVPN presents 10 must-have apps for your iOS device to keep your data safe and private December 15, 2016. 2016 has been the toughest year ever in online security, with multiple…
Equinix’s Top Technology Predictions for 2017
Equinix’s Top Technology Predictions for 2017 Clement Goh, Managing Director at Equinix South Asia The Asia-Pacific data center markets have enjoyed a year of robust growth in 2016 and 2017 is poised to be yet another season of data-driven acceleration.…
Gemalto Study Reveals Security Concerns over Convergence of Personal and Workplace Identities
Gemalto Study Reveals Security Concerns over Convergence of Personal and Workplace Identities – 90% of IT professionals are concerned about employees using their personal credentials for work purposes – 62% of enterprises feel increasing pressure to match consumer authentication methods…
CA Technologies Delivers Privileged User Governance to Better Protect Against Insider Threats
CA Technologies Delivers Privileged User Governance to Better Protect Against Insider Threats Latest Release of CA Identity Suite Strengthens Security and Accelerates Time-to-Value with New Deployment Options SINGAPORE, December 1, 2016 – CA Technologies today announced a new release of CA Identity Suite…
NEC enhances security at the 2016 APEC Economic Leaders’ Week in Peru
NEC enhances security at the 2016 APEC Economic Leaders’ Week in Peru – Facial recognition strengthens security for national leaders – Tokyo, December 1, 2016 – NEC Corporation (NEC; TSE: 6701) and NEC de Colombia S.A. provided the Peruvian National Police with NeoFace Watch…
ASUS AiProtection Neutralizes an Average of 1.5 Home Network Attacks and Risks Every Day on Each Protected ASUS Router
ASUS AiProtection Neutralizes an Average of 1.5 Home Network Attacks and Risks Every Day on Each Protected ASUS Router Integrated network security suite includes the world’s first implementation of commercial-grade intrusion prevention technology in a consumer router KEY POINTS ·…