Cyber Defense

Which Antivirus Software Works Best?

SAN FRANCISCO - As much as antivirus companies trumpet their evolving abilities to root out viruses, worms and Trojans on your PC, the cybersecurity industry leaves out one important piece of information: all the malicious code they're not detecting. Luckily, someone is scanning the scanners, CNET News.Com reported. On Thursday, the German nonprofit firm AV-Comparatives

By |2008-12-11T00:00:00-05:00December 11th, 2008|Archive, Cyber Defense|

Mozilla Firefox 3.1, Google Chrome Via For JavaScript Performance Time

MOUNTAIN VIEW, Ca. - On Tuesday, Mozilla released Firefox 3.1 beta 2 and Google released Chrome 0.4.154.33, so it's time for the latest installment of JavaScript performance testing. Here's the highlight from CNET News.Com: Though Firefox remains the leader on the SunSpider test, with a score of 2,110, Chrome edged very close with 2,140. A

By |2008-12-09T00:00:00-05:00December 9th, 2008|Archive, Cyber Defense|

Video Performance Problems Reported On New Apple MacBooks

CUPERTINO - Problems with Apple's newly redesigned MacBooks have been reported on Apple discussion boards and across the Internet, CNET News.Com reported Tuesday. The new notebooks, which have already run into problems with the trackpad, are said to have problems with video performance, third-party memory chips, and staying in sleep mode. It's always difficult to

By |2008-12-09T00:00:00-05:00December 9th, 2008|Archive, Cyber Defense|

New Cyber Security Push Is Urged By White House Panel

WASHINGTON - A commission of technology experts will propose consolidating cyber security work under a top White House official and using diplomatic, intelligence and military tools to confront threats in cyberspace. The new White House post is likely to be the most controversial of the commission's recommendations, which was released Monday and reported by The

By |2008-12-08T00:00:00-05:00December 8th, 2008|Archive, Cyber Defense|

Information Security Policy Vital To All Companies

DEARBORN - Charles Cresson Wood, CISA, CISM, CISSP, a keynote speaker at the Secure World Detroit Expo said its vital for all companies to implement an information security policy to keep the bad guys - both inside and outside the company - from stealing your company�??s secrets and intellectual property. Cresson Wood is the author

By |2008-12-04T00:00:00-05:00December 4th, 2008|Archive, Cyber Defense|

World Trade Center Attack Survivor’s Story

DEARBORN - Joseph Dittmar a World Trade Center survivor, told his moving story at the SecureWorld Detroit 2008 Expo at the Dearborn Conference. Dittmar was one of only seven insurance executives at a meeting of 54 that made it out of Tower Two alive. The biggest life lesson he said he learned was "don�??t sweat

By |2008-12-04T00:00:00-05:00December 4th, 2008|Archive, Cyber Defense|

Mobile Security Threats Growing Exponentially

KALAMAZOO - With employees, managers and executives using more and more mobile devices to link back to the network at the office, mobile security threats are increasing exponentially. Rebecca Herold, a noted Security expert, discussed the growing mobile security threat in November at a ConnecTech Kalamazoo seminar. To listen, click on MITechNews.MediaRica.Com a>>

By |2008-12-04T00:00:00-05:00December 4th, 2008|Archive, Cyber Defense|

Michigan InfraGard Update: Quarterly Board Meeting In Lansing

LANSING - The Michigan InfraGard Members Alliance, Board of Directors quarterly meeting was held from 9am until noon on December 4th in Lansing, with several members joining by conference call. Motions Passed: The board passed a motion to retain the existing board for 2009. The current Officers and board are listed at michiganinfragard.com (you will

By |2008-12-04T00:00:00-05:00December 4th, 2008|Archive, Cyber Defense|

Symantec Launches Veritas Operations Services

MOUNTAIN VIEW, Ca. - Symantec Corp. has announced the availability of the Veritas Operations Services, a new cloud computing-based online services platform that help organizations identify hidden risks in their data centers thus improving service availability and increasing productivity of the operations staff. "We want to help customers proactively manage their environment and reduce risk

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

Trend Micro Launches Email Encryption Gateway 5.0

SAN JOSE - Trend Micro Inc. has announced that it has expanded its e-mail encryption product line with the availability of the Trend Micro Email Encryption Gateway 5.0 that has been designed to help medium and large businesses encrypt e-mail communication on the Internet gateway. Trend Micro Email Encryption Gateway integrates with Trend Micro gateway

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|