You Are Browsing ‘Security ’ Category

Comments Off on Boston Partners Buys New Holdings in VASCO Data Security International, Inc. (VDSI)
(Source: The Ledger Gazette) VASCO Data Security International logo Boston Partners bought a new position in shares of VASCO Data Security International, Inc. (NASDAQ:VDSI) during the 4th quarter, according to the company in its most recent Form 13F filing with the Securities and Exchange Commission (SEC). The fund bought 497,940 shares of ......
Comments Off on TPM Update For Chrome OS: Why And How
(Source: Chrome Unboxed) The firmware for your TPM is maintained separately from the operating system allowing for a deeper level of security and segregation of the encrypted data the module holds. Recently, the Chromium developers have released a firmware update for the vast majority of Chromebooks on the market that includes a security ......
Comments Off on Imperva beats 4Q profit forecasts
(Source: CT Post) The data security software provider posted revenue of $91.1 million in the period, which fell short of Street forecasts. Seven analysts surveyed by Zacks expected $91.2 million. For the year, the company reported net income of $22.9 million, or 67 cents per share, swinging to a profit in the period. Revenue was reported as ......
Comments Off on Apple plans to spend $160m on second China data centre
(Source: The Phnom Penh Post) As for data security, he said the Chinese operator GCBD, with disaster recovery capabilities, already has data privacy and security protection in place. GCBD's shareholders include Inspur Group Co Ltd, China's largest server-maker. Apple is ratcheting up investment in China. Last March, the California-based company ......
Comments Off on Data breaches set to affect future sales
(Source: ComputerWeekly.com) Monetary theft (74%), identity theft (70%) and having embarrassing or sensitive information made public (45%) were the biggest data security concerns. More than a third (36%) also fear being blackmailed with stolen private images or messages. Some 84% of UK respondents and 81% of Italians listed security information ......
Comments Off on Report: Developing Opportunities within VASCO Data Security International, Raymond James Financial, Heritage-Crystal Clean, Warrior Met Coal, Tutor Perini, and Bristow Group — Future Expectations, Projections Moving into 2018
(Source: GlobeNewswire (press release)) Report: Developing Opportunities within VASCO Data Security International, Raymond James Financial, Heritage-Crystal Clean, Warrior Met Coal, Tutor Perini, and Bristow Group — Future Expectations, Projections Moving into 2018 ......
Comments Off on How to automate threat hunting
(Source: CSO Online) Threat hunting is proactively searching for indications of any IT security threat or compromise. It is about filling in the gaps in the SIEM rule set. It's accounting for the false negatives—the lack of alerts in situations when alerts really should be raised—in rule-based security systems. Threat hunting is successful when SOCs ......
Comments Off on Blockchain startup TBSx3 eyes GCC expansion after DP World deal
(Source: Arabian Supply Chain) DB Schenker's chief information officer, Charlie Mcdonald, added, “data security is the core to modern business risk management and we are excited by blockchain's potential in this area. The concept of protecting that data through a distributed ledger system holds great promise.” TBSx3 is working to expand the consortium ......
Comments Off on Amazon issues security patch for Key after researcher claims hack
(Source: SC Magazine UK) Amazon is issuing a security patch for its "Key"services shortly after a researcher posted a video demonstration of them claiming to hack the Amazon device using a Raspberry Pi. The researcher, who goes by the moniker MG, placed a device dubbed a “Break & Enter dropbox” near the Amazon device without any ......
Comments Off on Elevated Technologies Announces New Cybersecurity Service
(Source: PR Newswire (press release)) HOUSTON, Feb. 6, 2018 /PRNewswire/ -- Today, Elevated Technologies announces a 24/7/365 cyber security service offered by Elevated Cyber Security, a new department of Elevated Technologies. This new service will monitor networks and devices against malicious threats and abnormal use through their Security ......