PRODUCTS

Cyber Security Elements by NSS

Author name: admin9am

Sophos Security Threat Report, Highlights shifting crime tactics and what to expect in 2014

“While many security experts are aware of the high level trends, few have recognized their significance,” said James Lyne, global head of security research at Sophos. “If 2013 has taught us anything, it is that traditional security controls are struggling. These new behaviors are forcing the industry to adapt and change, and widely held best

Sophos Security Threat Report, Highlights shifting crime tactics and what to expect in 2014 Read More »

Jacarta JCAM-IR, HD Infrared IP Network Camera

As well as providing excellent daylight surveillance coverage, JCAM-IR also has infra-red capability to enable a comprehensive 24-hour surveillance operation to be implemented.  JCAM-IR Image Quality Crucial to the successful implementation of any security surveillance strategy is the image quality of the cameras being used. JCAM-IR is an HD 2MP fixed lens camera that can

Jacarta JCAM-IR, HD Infrared IP Network Camera Read More »

Skype’s Twitter account compromised by Syrian Electronic Army

This isn’t entirely surprising as the FBI had issued a warning on Christmas Eve to media organizations about a new wave of phishing attacks associated with the infamous SEA. Skype has more than three million followers on Twitter, which indicates that, had the attackers wanted to send out malicious links or other dangerous content, this

Skype’s Twitter account compromised by Syrian Electronic Army Read More »

California looks to implement ‘kill switch’ as smartphone theft deterrent

The Federal Communications Commission reports that mobile phone theft constitutes 30-40% of all robberies across the United States, a crime that cost US citizens $30 billion in 2012. In the Senator’s own state of California such thefts are even more prevalent, accounting for over 50% of street robberies, Los Angeles alone has seen a 12% increase

California looks to implement ‘kill switch’ as smartphone theft deterrent Read More »

As encryption standards tighten, Array retools ADC, eyes SaaS clients

Service providers need higher level of encryption support “If you look at one of our typical deployments, yes, they want security, they want SSL, but the numbers they support are in the thousands,” he said. “It’s nothing compared to a business model that is supporting millions of users. When we are talking to these SaaS

As encryption standards tighten, Array retools ADC, eyes SaaS clients Read More »

NSA secretly funding code-breaking quantum computer research

Quantum computing hinges, very broadly, on allowing individual bits (called qubits) to contain superimposed values of zero and one, vastly increasing computing power. Its implications for cryptography, medicine, and research have made it a major goal for public services and private industry alike: DARPA has devoted years of funding to quantum computing research, and Google

NSA secretly funding code-breaking quantum computer research Read More »

GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy!

What’s a CSR? If you have ordered an SSL Certificate before, you were most likely asked to provide a CSR. The CSR is used to deliver the public key that your server will use to identify itself. Generating a CSR can be a hurdle for non-technical staff that aren’t always familiar with the command lines

GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy! Read More »