| Date | Title | Description |
| 22.12.2024 | В США пользователь потерял $500 тысяч из-за звонка «сотрудника» Google | Житель США Адам Гриффин лишился почти $500 тысяч в криптовалюте после кражи его аккаунта Google. Мошенники организовали схему, которая включала звонок с номера Google, чтобы предупредить владельца якобы о взломе его учётной записи Gmail.
По... |
| 28.03.2024 | Coro, building cybersecurity for SMBs, locks down $100M at a $750M valuation | Enterprises and other large organizations have long been a lucrative and obvious target for cybercriminals, but in recent years — thanks to more sophisticated breach techniques and the rise of AI — small and medium businesses are now also v... |
| 22.11.2023 | Sekoia: Latest in the Financial Sector Cyber Threat Landscape | A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing.
The financial... |
| 09.08.2023 | Symmetry raises $18M to bolster organizations’ data security programs | As organizations embrace cloud services — and are forced to confront changing regulations and data use standards — their ability to maintain control of data security frequently becomes strained. If they lose that control, the consequences c... |
| 21.07.2023 | Making The World A Safer Place For Data With Evolved Visibility And Security | Jill Stelfox is Executive Chair and CEO of Panzura, leading hybrid multi-cloud data management software/services for the enterprise market. |
| 06.06.2023 | Как превратить умную колонку Google в «жучок» и получить за это $100 тысяч | Недавно компания Google выплатила мне награду в $107500 за ответственное раскрытие проблем безопасности в умной колонке Google Home. Эти уязвимости позволяли нападающему, находящемуся в пределах беспроводного доступа, создать на устройстве ... |
| 31.01.2023 | Sentra raises $30M to provide a security layer for data in the cloud | The move to the cloud, accelerated by the pandemic, continues unabated. By 2025, Gartner estimates that more than 95% of new digital workloads will be deployed on cloud-native platforms, up from 30% in 2021. The motivation is convenience pa... |
| 21.10.2022 | New partnership bolsters cybersecurity defences in Poland | Stockholm, Sweden, 21 October 2022– Organizations in Poland are now able to better protect themselves against cyber threats thanks to a new partnership between leading global cyber security solutions provider Holm Security and Polish-based ... |
| 30.09.2022 | Cyberwar in Ukraine: What You See Is Not What’s Really There | It has been seven months since Russia invaded Ukraine. Despite much speculation, many aspects of the war have ultimately not turned out as expected. The war wasn’t, as Russia had anticipated, a six-day rout—or even a six-month one. And nota... |
| 08.07.2022 | 5 Tips for Guarding Against Zero-Day Attacks | Zero-day attacks are severe malware threats whose consequences can severely impact your business. Hackers can steal your data, intellectual property, and money, compromising your operations. You can be a zero-day attack victim if your compa... |
| 01.07.2022 | Oak9 adds security for infrastructure-as-code and the cloud | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Oak9, a developer-first infrastructure-as-code (I... |
| 03.06.2022 | Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know | Global cyber futuristic financial network security concept. Fast speed internet connection. Block ... [+] chain network getty |
| 23.05.2022 | Lets talk about Cybersecurity for the Manufacturing Sector: CS2AI Symposium Wednesday, May 25 1:00PM EST | We invite you to join us for Part 1 of the Cybersecurity for Manufacturing Sector this Wednesday at 1 EST. This symposium is free and virtual.
Whatever metric one chooses to study, it is easy to see that the manufacturing sector is enormous... |
| 20.05.2022 | Career paths in cybersecurity: Key skills, salary expectations and job description | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cybersecurity professionals are in increasingly h... |
| 19.05.2022 | Higher education institutions being targeted for ransomware attacks | Image: normalfx/Adobe Stock
While higher education is typically not thought of as a targeted industry for ransomware attacks, a trend may be forming. Three different colleges, North Carolina A&T University, Lincoln College and Austin Pe... |
| 03.05.2022 | Syxsense looks to provide a unified endpoint-management and security cloud-based service | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Syxsense, an IT and security management provider,... |
| 15.04.2022 | Watch out: New phishing tactics disguised as fun | Social media quizzes and questionnaires are common. They make you laugh, with dozens of people commenting on their answers and sharing their stories. You see a post asking users about their first pets, their names, and some funny situations... |
| 12.04.2022 | BlackCat Is the Latest Successor of Ransomware Group, BlackMatter | Ransomware gang on-the-rise, BlackCat (ALPHV), have been linked to previously defunct groups BlackMatter and REvil, due to their shared use of the sophisticated BlackCat malware.
The cybercriminals have already launched a number of attacks ... |
| 31.03.2022 | Apple and Meta shared data with child hackers pretending to be law enforcement | Image: xijian / Getty Images
It was revealed on March 30 that both Apple and Facebook parent company, Meta, were duped by child hackers impersonating law enforcement officers last year, according to a report from Bloomberg. The two companie... |
| 03.03.2022 | How Biden’s new cybersecurity law will affect your business | Image: your/Shutterstock
There are new governmental regulations to be aware of in case your enterprise suffers a cyber incident.
The Strengthening American Cybersecurity Act, which was signed into law by President Joe Biden on March 15, put... |
| 09.02.2022 | HelpSystems Signs Agreement to Acquire Tripwire to Extend Cybersecurity Portfolio | Kate Bolseth, CEO, HelpSystems Tripwire’s file integrity monitoring solution pairs business context with necessary remediation steps, making it an important piece of the cybersecurity puzzle for organizations in highly regulated industries.... |
| 29.11.2021 | Armis expands past IoT with $300M for ‘comprehensive’ asset security | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
Armis, which provides a visibility and security platform for all assets within an enterprise i... |
| 29.11.2021 | Armis expands past IoT with $300M for ‘comprehensive’ asset security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Armis, which provides a visibility and security p... |
| 22.11.2021 | IoT anomaly detection startup Shield-IoT lands $7.4M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Shield-IoT, a provider of AI-driven security and ... |
| 22.11.2021 | IoT anomaly detection startup Shield-IoT lands $7.4M | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
Shield-IoT, a provider of AI-driven security and monitoring technologies for large-scale inter... |
| 13.11.2021 | Report: 99% of federal security pros want the government to increase data protection | According to new research from Tripwire, 95% of security pros in the private sector think the government should play a bigger role in securing non-governmental organizations (NGOs). More specifically, critical infrastructure representatives... |
| 13.11.2021 | Report: 99% of federal security pros want the government to increase data protection | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
According to new research from Tripwire, 95% of s... |
| 09.11.2021 | Security pros say federal government should do more to protect and secure private sector | Image: istock/BCFC
In response to the recent wave of high-profile ransomware attacks, the U.S. government has been taking a more active role in the battle against cybercrime. Beyond going after ransomware gangs and recovering money stolen f... |
| 22.09.2021 | Enterprise tech adoption fuels cyber risks | A new GamesBeat event is around the corner! Learn more about what comes next.
Seventy-four percent of companies attribute recent cyberattacks to vulnerabilities in technology put in place during the pandemic. That’s according to a new repor... |
| 22.09.2021 | Enterprise tech adoption fuels cyber risks | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Seventy-four percent of companies attribute recent cyberattacks to vulnerabilities in technology put in place during the pandemic. That... |
| 11.08.2021 | Ransomware Payments and the Law | Your taxes are going up. Not because of the bipartisan infrastructure bill. Not because Democrats are keen to hike taxes to pay for their spending in the coming reconciliation bill.
We are all facing a tax increase at the hands of foreign c... |
| 23.07.2021 | The top five cybersecurity threats facing the Tokyo 2020 Olympic Games and how they could disrupt events, halt broadcasts and expose sensitive data | The Tokyo 2020 Olympic Games, which officially begins today, isn’t going to look anything like the Olympic Games that have gone before it. |
| 09.07.2021 | Public cloud security ‘just barely adequate,’ experts say | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Between the sharp rise in cyberattacks and overal... |
| 09.07.2021 | Public cloud security ‘just barely adequate,’ experts say | Join AI & data leaders at Transform 2021 on July 12th for the AI/ML Automation Technology Summit. Register today.
Between the sharp rise in cyberattacks and overall rapid migration to the cloud, cloud security is quickly becoming a top ... |
| 23.04.2021 | SPLUNK INC.
Splunk : SUPERNOVA Redux, with a Generous Portion of Masquerading | Share:
By John Stoner April 22, 2021
Contributors: Mick Baccio, Katie Brown, James Brodsky, Drew Church, Dave Herrald, Ryan Kovar,Marcus LaFerrera, Michael Natkin and John Stoner
If you want just to see how to find masquerading, skip down t... |
| 09.03.2021 | Is Hardsec the Future of Cybersecurity? | Ernest Hamilton, Tech Times 09 March 2021, 10:03 pm
(Photo : Is Hardsec the Future of Cybersecurity?)
Malicious cyber activity is big business - it costs the US economy more than $5 billion annually. According to the US Council of Economic ... |
| 19.02.2021 | The Future Of Data: Is Your Company Ready? | CEO and Co-Founder of OpenVPN Inc., leading-edge networking and software technology with over 60 million downloads since inception. |
| 09.02.2021 | Digital.com Names Best Vulnerability Management Software of 2021 | SEATTLE (PRWEB) February 09, 2021
Digital.com, a leading independent review website for small business online tools, products, and services, has announced the best vulnerability management software of 2021. The top systems were selected bas... |
| 13.01.2021 | Google unravels state-of-art Android and Windows exploit chains | Google's Project Zero security researchers have published a six-part detailed analysis of a set of vulnerabilities found on two exploit servers early last year that were to be used in so-called watering hole attacks with compromised web ser... |
| 05.01.2021 | Babuk Locker emerges as the first new form of ransomware in 2021
Since you’re here …
Send us a News Tip
EXTRACT THE SIGNAL FROM THE NOISE
Cookies | Five days into 2021, already a new form of ransomware has emerged: Babuk Locker.
First detailed Sunday by Chuang Dong, the ransomware uses its own implementation of SHA256 encryption called “ChaCha8” and also uses so-called Elliptic-curve D... |
| 20.11.2020 | Future Capcom Games Leaked After Huge Cyberattack, 350,000 Records Stolen | Nhx T., Tech Times 20 November 2020, 06:11 am
Cyberattacks have been happening quite frequently in the past weeks, with giant gaming company Capcom confirming earlier this month of November that they had been hacked by an unknown third-part... |
| 01.10.2020 | Cisco acquires PortShift to raise its game in DevOps and Kubernetes security | Cisco is making another acquisition to expand its reach in security solutions, this time specifically targeting DevOps and the world of container management. It is acquiring PortShift, an Israeli startup that has built a Kubernetes-native s... |
| 18.09.2020 | Signal Private Messenger – Secure, Fast, and Protects your Privacy in 2020 | BOTTOM LINE: If you want to protect your Privacy then Install Signal Private Messenger. It is recommended by the famous whistleblower Edward Snowden!
This year, 2020, has been a bit of a crazy ride so far. And many of us aren’t sure where i... |
| 10.09.2020 | StackRox nabs $26.5M for a platform that secures containers in Kubernetes | Containers have become a ubiquitous cornerstone in how companies manage their data, a trend that has only accelerated in the last eight months with the larger shift to cloud services and more frequent remote working due to the coronavirus p... |
| 11.06.2020 | Cybersecurity pros are working harder than ever during the pandemic | Image: Ridofranz, Getty Images/iStockphoto Must-read security coverage
Best encryption software 2022
The 10 best antivirus products you should consider for your business
8 enterprise password managers and the companies that will love them
S... |
| 17.05.2020 | CCPA for Marketers: What You Really Need to Know | California Consumer Privacy Act (CCPA) has put restrictions and conditions on how organizations can store, process, and share consumer data in California. The privacy act has given broad rights to the consumers over their data that organiza... |
| 28.04.2020 | Hoxhunt Looks to Strengthen the Human Element in Cybersecurity | Ernest Hamilton, Tech Times 28 April 2020, 11:04 pm
(Photo : Hoxhunt Looks to Strengthen the Human Element in Cybersecurity)
Most companies already operate on the premise that cyberattacks can cause them great harm. As such, they are alread... |
| 15.01.2020 | How We Turn Cybersecurity Concepts Into a Classroom Staple | For many, the topic of cyber-crime instantly brings to mind a horde of “Mr. Robot”-like hackers striving for the greater good to take down “The Man.” Unfortunately, the reality of it isn’t as satisfying and large corporations aren’t the sol... |
| 31.12.2019 | Protecting data on public clouds and edges with confidential computing
Microsoft announces Confidential Computing for Kubernetes, IPv4/IPv6 dual-stack, and KEDA 1.0 | This article is part of the Technology Insight series, made possible with funding from Intel.
Using the public cloud is like swimming in the ocean. Both are vast resources filled with potential –- and peril. Without proper precautions, even... |
| 31.12.2019 | Protecting data on public clouds and edges with confidential computing
Microsoft announces Confidential Computing for Kubernetes, IPv4/IPv6 dual-stack, and KEDA 1.0 | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
This article is part of the Technology Insight se... |
| 08.05.2019 | A Look Back on Some of the Most Devastating Crypto Hacks | Another day, another cryptocurrency exchange hack.
Recently the crypto world has been shaken by the Binance hack, that vanished approximately US$40 million worth of bitcoin through patient methods to avoid detection.
It’s just the latest in... |
| 22.01.2019 | Google Hit With Record €50m Fine for Shady Ad Practices | Google has been slapped with a record €50 million ($56 million) fine by the French privacy watchdog, CNIL.
Following an investigation into the Google’s advertising practices, CNIL and other EU privacy regulators found that the company was v... |
| 06.12.2018 | McAfee Says Smart Speakers Could Become Targets for Sophisticated Malware in 2019 | McAfee Says Smart Speakers Could Become Targets for Sophisticated Malware in 2019
Maddie Iribarren on December 6, 2018 at 1:15 pm
Last week McAfee released the McAfee Labs 2019 Threats Predictions Report which details seven different securi... |
| 19.10.2018 | 35 million voter records up for sale on the dark web | Originally Published by:
Inside Facebook's cybersecurity 'war room' 450 Amazon employees protest facial recognition software being sold to police Tech giants use AI to fight famine in coordination with international groups
Dark web peddlers... |
| 09.08.2018 | Organizations struggle with 'cyber hygiene’ basics | Almost two-thirds of organizations are failing to use established benchmarks to set security baselines and are struggling to maintain visibility into their networks, according to a new report.
The study, carried out for security and complia... |
| 19.06.2018 | Google Home Location Security Vulnerability to be Closed in July | Google Home Location Security Vulnerability to be Closed in July
Bret Kinsella on June 19, 2018 at 7:09 am
A security researcher from Tripwire, Craig Young, has determined that a feature common to Google Home and Chromecast can enable someo... |
| 19.04.2018 | Cyber attacks could cause catastrophic failure say 70 percent of energy security pros | A new study looking at industrial control systems (ICS) security in the energy industry reveals a majority of respondents are worried about potentially catastrophic effects from a successful cyber attack.
The study carried out for security ... |
| 08.03.2018 | Startup competitions seeking cyber security companies | They include SXSW Accelerator Pitch Event, Cybertech Startup Competition and Fintech Vortex’18
If you're a startup seeking opportunities to get funded, educated or connected, startup competitions are a great resource.
Vator has been holding... |
| 02.02.2018 | Fewer than a fifth of enterprises have a notification plan in place for data breaches | With the EU's GDPR legislation coming into force in a few months, and new and potentially tougher legislation on data breaches planned in the US, a new study reveals that many enterprises are under prepared.
The report from integrity assura... |
| 26.01.2018 | Corporations seen as a bigger threat to data privacy than cyber criminals | Ahead of this Sunday's (January 28) Data Privacy Day, enterprise cyber security company Tripwire has conducted a poll of Twitter users asking who they were most concerned about collecting their private information.
Of the more than 300 peop... |
| 03.01.2018 | How to Protect Your Home Router from Attacks | Your router, that box sitting in a corner of your house giving you internet access, is in many ways more important than your laptop or mobile phone. It might not store any of your personal information directly, but sensitive data passes thr... |
| 07.12.2017 | Three quarters of retail organizations lack a breach response plan | As online retailers gear up for their busiest period of the year, how prepared are they to face the threat of cyber attacks?
A new study from cyber security company Tripwire reveals that just 28 percent of respondents say they have a fully ... |
| 18.10.2017 | Security professionals say the need for soft skills has increased | According to the results of a new survey, the need for soft skills like communication and critical thinking has increased in the IT security sector.
The study conducted by Dimensional Research for security and compliance specialist Tripwire... |
| 15.10.2017 | It will take more than a lone vigilante to save the IoT from botnets | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Like everyone else, I caught the new trailer for ... |
| 15.10.2017 | It will take more than a lone vigilante to save the IoT from botnets | Like everyone else, I caught the new trailer for the next Star Wars movie on Monday and “saw raw, untamed power … and beyond that, something truly special.” I’m now spotting Lucasfilm metaphors everywhere. Since IoT is my personal and profe... |
| 07.09.2017 | Skills required for a cyber security career have changed | As we saw earlier this week, the cyber security industry is looking for new blood in order to solve the skills crisis.
Another study this week by security and compliance firm Tripwire underlines this, with 81 percent of existing security pr... |
| 27.07.2017 | Top 100 Cybersecurity Startups in Q2 of 2017 | With Black Hat in full swing and global cyber attacks making headlines more often than the Kardashians, the cybersecurity discussion is trending up in the business world and beyond. Large companies, small startups, and overly trusting indiv... |
| 28.06.2017 | Petya ransomware goes global -- what's happening and how to protect yourself | The ransomware attack we reported yesterday may have begun in the Ukraine, but it spread rapidly across Europe and has now hit companies in Australia and the US including pharmacy giant Merck.
A variant of the Petya ransomware now being dub... |
| 16.05.2017 | Companies scramble to recover from crippling ransomware attacks: F-Secure to hold local seminars | Cyber criminals exploiting a security flaw in unpatched installations of Microsoft's Windows XP operating system brought many organisations around the world to their knees on Friday with their so-called WannaCry ransomware attack that locke... |
| 13.05.2017 | Trump’s cybersecurity executive order is a good first step | Robert R. Ackerman Jr. Contributor
Robert R. Ackerman Jr. is the founder and managing director of AllegisCyber, a venture capital firm specializing in cybersecurity, and the co-founder and executive at DataTribe, a cybersecurity startup fou... |
| 11.04.2017 | How millions of Android devices could be at risk of total takeover | Originally developed as a digital camera platform, Android has definitely come a long way. It just surpassed Windows to become the most popular operating system for Internet usage in the global digital realm.
This has been established throu... |
| 14.03.2017 | IT security pros expect a rise in Industrial Internet of Things attacks | The Industrial Internet of Things (IIoT) is used in many businesses, including critical infrastructure sectors such as energy, utilities, government, healthcare and finance. No surprise then that it's a likely target for attack.
A new surve... |
| 09.03.2017 | Interoperability: The key to the emerging smart city | Smart city technologies continue to experience rapid growth, both in the development of new devices and their applications within the city environment. Globally, cities’ investment in Internet of Things (IoT) technologies will increase by $... |
| 17.01.2017 | Adivinha qual foi a pior senha de 2016? | Ela mesma, a combinação “123456”. Pelo menos é o que aponta um relatório da Keeper Security (PDF). Não é nenhuma novidade, pois todo ano estudos do tipo apontam essa senha como a mais comum. O que surpreende no levantamento da Keeper é a pr... |
| 16.01.2017 | The list of most common passwords of 2016 includes a few surprises | Security breaches and data leaks are, obviously, a major concern, but they do have something of a silver lining. Leaks of passwords may open up the risk of individual accounts being targeted, but they also serve as a fascinating insight int... |
| 14.01.2017 | The most common passwords of 2016 | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Looking at the list of 2016’s most common passwor... |
| 14.01.2017 | The most common passwords of 2016 | Looking at the list of 2016’s most common passwords, I can’t stop shaking my head. Nearly 17 percent of users are safeguarding their accounts with “123456.” What really perplexes me is that so many website operators are not enforcing passwo... |
| 11.10.2016 | 5 Reasons Why Small Businesses Need Cyber Security | According to The National Cyber Security Alliance, one out of five small businesses is affected by cybercrime each year. Worse, 60% of those hit go out of business within six months after the attack. In most cases, the potential consequence... |
| 28.07.2016 | Creating a security-aware mobile culture | Historically hackers have pursued and targeted individuals more frequently than they have targeted businesses as they are typically the path of least resistance. However, the number of organizations worldwide falling victim to major cyber a... |
| 19.07.2016 | Everything you need to know about ransomware | Ransomware is one of the most feared security threats today and it is fast becoming one of the most profitable areas of cybercrime for attackers. It allows criminals to monetize their cybercrime efforts quicker than previous tactics allowed... |
| 07.07.2016 | Government IT pros overconfident about detecting insider threats | Federal government IT professionals are overconfident in their ability to detect insider threats, endpoint security firm Tripwire has found. Analyzing the confidence of IT experts regarding their efficiency in seven key security controls, i... |
| 08.02.2016 | Energy industry is not prepared for cyber attacks | The energy industry is mostly unprepared for cyber-threats, a new study by Tripwire suggests.
The global provider of advanced threat, security and compliance solutions announced these results in a study conducted for it by Dimensional Resea... |
| 20.01.2016 | Smart TVs pose huge security risks | Over the past few years we have seen everyday items such as refrigerators, lighting and heating systems and even kettles all of a sudden becoming "smart". In fact there are now more smart items on the planet than smart humans, or ... |
| 26.12.2015 | 5 Effective Strategies for Managing Your Startup | Effectively managing a startup company requires a certain amount of expertise combined with a sufficient amount of both business and practical experience. Startup companies are often fragile flowers that need the proper nutrients in order t... |
| 20.11.2015 | Flaws In Password Manager LastPass Expose Users' Passwords | On the internet, nothing is unhackable.
That's the main takeaway from new research showing that the popular password manager LastPass, which is generally considered secure, actually has a series of flaws that could expose users' passwords.
... |
| 20.10.2015 | Meet the Real-Life Mr. Robot | Ken Westin is an online stalker. He writes malware, tracks his targets through their devices, and uses social media to gather intel on how to break into networks. He's good at it, too. Some even call him "Mr. Robot," a reference t... |
| 09.09.2015 | Bitcoin cyberextortionists are blackmailing banks, corporations | Zach Copley reader comments 47 with 32 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
A number of large UK corporations and institutions, such as Lloyds Bank and BAE systems, have reported a “marke... |
| 18.06.2015 | Changing regulatory landscape and cost of compliance demands a new approach | Changing regulatory landscape and cost of compliance demands a new approach
18-06-2015
The changing regulatory landscape and increasing complexity of technologies require a new approach to compliance thinking, says Pirus Consulting.
Over th... |
| 20.05.2015 | This 9-Year-Old CEO Knows more about Cyber Security Than You Do | Meet Reuben Paul. He has a black belt in in Kung-fu, is CEO and founder of Prudent Games inc., a gaming company that teaches users while they play, and very well established in the cyber security universe as “The RAPstar.”
Oh and he’s only ... |
| 11.03.2015 | #ICYMI: Jamba’s new AAPL juice and more tech stories you shouldn’t miss | Welcome to ICYMI, a rundown of news that you might have missed today. From VB:
No surprises here: Asus attacks Apple for making products for the crazy ones.
It’s light. It’s aluminum. It charges over USB Type C. It’s not the new Macbook; it... |
| 11.03.2015 | #ICYMI: Jamba’s new AAPL juice and more tech stories you shouldn’t miss | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Welcome to ICYMI, a rundown of news that you migh... |
| 11.09.2014 | Apple Watch will boost wearable adoption and add risk say experts | The adoption of wearable technology is on the verge of becoming mainstream and that process can only be accelerated by the release of the Apple Watch.
A recent study by Acquity, part of the Accenture consulting group, shows that wearable fi... |
| 18.10.2013 | New brain monitor could help ALS patients communicate | MassDevice.com On Call | MASSDEVICE ON CALL — San Diego-based NeuroVigil is launching its 1st clinical trials in Philadelphia, evaluating a new system that the company says can help patients suffering from ALS communicate and interact with the outside world.
The de... |
| 11.04.2012 | CloudPassage lands $14M to boost cloud security for Foursquare, StrongMail, others | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cloud security startup CloudPassage has raised $1... |
| 24.05.2011 | Tripwire Acquired by Thoma Bravo | Tripwire, Inc., a Portland, Oregon-based global provider of IT Security and Compliance Automation solutions, has been acquired by private equity investment firm Thoma Bravo, LLC.
Following the transaction, whose financial details were not d... |
| 28.05.2010 | TripWire, a security and compliance vendor, files for $86M IPO | Portland, Oregon-based TripWire plans to raise $86.25 million by going public on the Nasdaq under the ticker symbol TPWR.
J.P. Morgan and Thomas Weisel Partners will share the underwriting role.
TripWire builds enterprise security and priva... |
| 28.05.2010 | TripWire, a security and compliance vendor, files for $86M IPO | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Portland, Oregon-based TripWire plans to raise $8... |
| 30.08.2009 | VMworld Preview: VMware's 'Internal Cloud,' New Products, More | News VMworld Preview: VMware's 'Internal Cloud,' New Products, More By John K. WatersAugust 30, 2009
SAN FRANCISCO, CALIF. -- The fifth annual VMworld user conference gets under way this week in San Francisco with a flurry of product announ... |
| 30.08.2009 | VMworld Preview: VMware's 'Internal Cloud,' New Products, More | News VMworld Preview: VMware's 'Internal Cloud,' New Products, More By John K. WatersAugust 30, 2009
SAN FRANCISCO, CALIF. -- The fifth annual VMworld user conference gets under way this week in San Francisco with a flurry of product announ... |
| 14.07.2008 | Microsoft unleashes the cannibals again | This time at VMware
One of the most powerful weapons used by dominant technology companies is the power of commoditization. Established players with product offering breadth can crush single product line competitors by offering loss leader ... |