Study: Cybercrime Costs Grow 26%

  Ponemon Report Sorts Through Key Factors A big challenge when attempting to drum up support for investments in information security is demonstrating the cost of data breaches and other cybercrimes. But because very few cyber-attack victims have revealed the costs involved, sizing up the potential financial impact is tough.... Read more

Hexis Cyber Solutions Launches Industry’s First Comprehensive Intelligent Active Defense Solution

HANOVER, Md., October 8, 2013 (GLOBE NEWSWIRE) — Hexis Cyber Solutions (Hexis), a subsidiary of KEYW Corporation (NASDAQ: KEYW), today unveiled HawkEye G, the industry’s first truly active defense solution to detect stealthy advanced cyber threats and take automatic action to remove the threats from the network. By delivering fast... Read more

SSI Pacific and Hexis Cyber Solutions join forces to address data retention requirements and cyber defence issues across Asia Pacific

Strategic partnership enables customers to manage data retention requirements and advanced persistent threat challenges MELBOURNE Australia – SSI Pacific, a leading independent system integrator in the “Asian Pacific” rim providing world leading Security Intelligence and monitoring solutions for Governments, Telecommunications and Enterprise sectors  today announced the finalisation of its strategic... Read more

Australia main conduit for cyber attacks

Australia is emerging as a major conduit for targeted cyber attacks, a report shows, as online criminals shift their gaze towards Asia. The country has become the main location of so-called “command and control” servers, which are used by cybercriminals when they attack governments and businesses. According to a report... Read more

Adobe reports massive security breach

Adobe reported what it called a “sophisticated” cyberattack on its network where hackers gained unauthorized access to confidential customer information including IDs and encrypted passwords. The hack affects some 2.9 million customers worldwide, the company estimates. Information accessed in the attack includes names, encrypted credit or debit card numbers, expiration... Read more

Page 6 of 10« First...45678...Last »