Security

  • Connecting The Dots Between Tax Day, Identity Theft And Digital Transformation

    Connecting The Dots Between Tax Day, Identity Theft And Digital Transformation

    It probably is no surprise to the security professional community that once again, identity theft is among the IRS’ Dirty Dozen tax scams, according to a recent IRS.Gov Newsroom article. Criminals use stolen social security numbers and other personally identifiable information to file tax claims illegally, deposit the tax refunds to rechargeable debit cards, and vanish before the… Read More

  • Veradocs, Renamed Vera, Wants To Protect All Data

    Veradocs, Renamed Vera, Wants To Protect All Data

    Veradocs came out of stealth today, renaming itself Vera to reflect the fact it doesn’t just protect documents on the move, but other types of data as well. The company, which has been working toward this day for some time, announced $14M in Series A funding last November. At the time, Vera was in Beta working with a small set of customers, but today it announced general… Read More

  • Palerra Snags $17M To Automate Cloud Security

    Palerra Snags $17M To Automate Cloud Security

    Palerra, a cloud security startup, announced $17M in funding today as it continues to build its cloud security automation business. The round was led by new investors August Capital with current investors Norwest Venture Partners (NVP), Wing Venture Capital and Engineering Capital also participating. Today’s money brings the total investment to $25M. The cloud service was founded in… Read More

  • The Cloud Could Be Your Best Security Bet

    The Cloud Could Be Your Best Security Bet

    In fact, if a cloud service has proper controls, it could be safer than running your own datacenter. Amazon, Google, Salesforce and Box to a company have much more at stake when it comes to security. A breach could prove devastating to their businesses. That could be why it’s hard to come up with a major security snafu involving a cloud provider. Other than the Jennifer Lawrence… Read More

  • Check Point Snags Israeli Mobile Security Company Lacoon

    Check Point Snags Israeli Mobile Security Company Lacoon

    Check Point Software Technologies announced it has purchased Lacoon Mobile Security today. Reports surfaced last month that the company was in talks to buy the Israeli company for $80M. No official price was given, but the deal is expected to close today. The move gives Check Point a mobile security piece that’s a bit different from the traditional mobile device management you see… Read More

  • Google Bans China’s Website Certificate Authority After Security Breach

    Google Bans China’s Website Certificate Authority After Security Breach

    Google has announced that its web browser Chrome and other products will no longer recognize security certificates issued by the China Internet Network Information Center (CNNIC), the government agency that oversees China’s domain name registry. Read More

  • As Internal Threats Rise, Investors Back New Security Tech

    As Internal Threats Rise, Investors Back New Security Tech

    Amid this steady drumbeat of technology breaches and security snafus, venture capitalists have spent roughly $6.5 billion on new technologies to combat this menace, according to CrunchBase data. The latest company to benefit from this deluge of dollars, and the one that addresses the issue of bad actors inside corporate networks most directly, is HyTrust, which closed on $25 million. Read More

  • Google Says 5% Of Visitors To Its Sites Have Ad Injectors Installed

    Google Says 5% Of Visitors To Its Sites Have Ad Injectors Installed

    According to a study Google conducted with researchers at the University of California, Berkeley, 5 percent of people visiting Google’s sites and services now have at least one ad injector installed. When it comes to malware, ad injectors may seem relatively benevolent at first. They put an ad on your Google Search page that didn’t belong there, for example. That’s annoying… Read More

  • These Activists Are Plotting To End Internet Censorship In China

    These Activists Are Plotting To End Internet Censorship In China

    “I hope we put ourselves out of business,” said Charlie Smith, the pseudonymous head of Great Fire. And he was serious. After all this Chinese Internet monitoring watchdog GreatFire.org is no ordinary case. Started in 2011 by three anonymous individuals tired of China’s approach to the internet, it initially tracked the effects of the country’s censorship system on… Read More

  • GitHub Continues To Face Evolving DDoS Attack

    GitHub Continues To Face Evolving DDoS Attack

    Online code repository GitHub continues to face a distributed denial-of-service (DDoS) attack on Monday, which the company reported is the largest attack in GitHub.com’s history. The attack began on Thursday and still continues, according to GitHub’s status page and Twitter accounts, though the company says now that all its systems are reporting at 100%. However, the… Read More

  • Crossing the Cybersecurity Trust Chasm

    Crossing the Cybersecurity Trust Chasm

    We need to (re)build trust: between the government and the public; between a company and its employees; between a company and its customers; between different private sector companies; and finally between the government and the private sector. Read More

  1. 1
  2. 2
  3. ...