Cyber Defense

Bell Microproducts Launches New Security Division

SAN JOSE - Bell Microproducts Inc., one of the largest value-added distributors of storage and computing technology, has created a new security division for its North American customers. Duncan Hume, who spearheaded Bell Microproducts' U.K. security division and has served as a divisional manager for the past eight years, would serve as director of the

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

Symantec Launches Veritas Operations Services

MOUNTAIN VIEW, Ca. - Symantec Corp. has announced the availability of the Veritas Operations Services, a new cloud computing-based online services platform that help organizations identify hidden risks in their data centers thus improving service availability and increasing productivity of the operations staff. "We want to help customers proactively manage their environment and reduce risk

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

Trend Micro Launches Email Encryption Gateway 5.0

SAN JOSE - Trend Micro Inc. has announced that it has expanded its e-mail encryption product line with the availability of the Trend Micro Email Encryption Gateway 5.0 that has been designed to help medium and large businesses encrypt e-mail communication on the Internet gateway. Trend Micro Email Encryption Gateway integrates with Trend Micro gateway

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

EMC Updates Data Protection

HOPKINTON, Ma. - EMC is continuing to integrate its disk-based back-up and recovery solutions with new software enhancements and solutions. "For years, companies utilized tape-based storage systems for backing-up and restoring data. EMC, on the other hand, has established leadership in developing and delivering higher performance disk-based technologies for these processes, significantly shortening the time

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

IT Pros Mostly Positive About Gen Y’s Impact, But Big Concerns Over Security Exist

TORONTO - Although IT professionals have high hopes for the positive impact Gen Y workers will have on the innovation and adoption of technology, they're also greatly concerned about the security threats that the incoming workforce will pose to their businesses because of Gen Y's tech-savvy nature. It's a double-edged sword, said Elaine Mah, small

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

SecureWorld Expo Announces 2009 Schedule

PORTLAND, Or. - SecureWorld has announced their 2009 schedule starting this February with the Houston SecureWorld, February 11-12, 2009 to the George R. Brown Convention Center. SecureWorld continues to offer a wide range of training in a local setting. Continued this year is the popular SecureWorld+ Extended Training along with a packed conference agenda, panel

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

Walsh College Hosts January Info Meetings To Explain DOD Information Assurance Scholarship

TROY - On January 7 and January 21, Walsh College will hold informational meetings regarding a U.S. Department of Defense-funded scholarship for concentrated studies in information assurance. The meetings will be held at the Troy campus at 5 p.m. in Room 124. February 13 is the deadline to apply for the scholarships, available to undergraduate

By |2008-12-03T00:00:00-05:00December 3rd, 2008|Archive, Cyber Defense|

Motor City ISSA Holiday Awards Gala

TROY - The Motor City Chapter of ISSA will review Information Security threats and issues for 2008 and forecast what's in store for 2009 on Dec. 18 at Walsh College. New President Steve Hill also will discuss how the ISSA Can Empower Security Strategists and Practitioners. Chapter elections results will be announced at the meeting.

By |2008-12-01T00:00:00-05:00December 1st, 2008|Archive, Cyber Defense|

Gmail Vulnerability Turns Out To Be Phishing Scam

SAN FRANCISCO - The alleged vulnerability reportedly allowed an attacker to set up filters on users' e-mail accounts without their knowledge, according to a proof of concept posted Sunday at the blog Geek Condition. In the post, Geek Condition's Brandon wrote that the vulnerability had caused some people to lose their domain names registered through

By |2008-11-26T00:00:00-05:00November 26th, 2008|Archive, Cyber Defense|