Cyber Attacks Resources

Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Tag "Cyber Attacks"

The Magic of Non-Persistency in Desktop Virtualization

By Guise Bule for DABCC This article is accompanied by a video presentation on the same subject that the author recently delivered as part of the BrightTALK Next Generation Summit.  You can watch this 25 min. video presentation here : Let us be honest, deep down we all believe in magic and if you […]

Core Security Technologies Discovers Vulnerability in Key Microsoft Virtualization Technology

Core Security Technologies, provider of the CORE IMPACT family of comprehensive enterprise security testing solutions, today issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft’s Virtual PC virtualization software and leave them open to potential attack. “Virtualization is an area that offers tremendous promise to the entire […]

ArcSight and Ping Identity Partner to Deliver Visibility and Control to Cloud Computing

ArcSight, Inc. (NASDAQ:ARST), a leading global provider of security and compliance management solutions that protect enterprises and government agencies, today announced a planned joint solution with Ping Identity, the leader in Internet Identity Security, that will give organizations in-depth visibility into activity across traditional applications, IT infrastructure and cloud applications. “As companies look for ways […]

Yoggie Management Server Transformed into VMware-based Virtual Appliance

Unique hardware for managing fleets of award-winning miniature security computers becomes a virtual appliance available via download Yoggie Security Systems today announced that the Yoggie Management Server™ (YMS) – an appliance used by companies to manage their fleets of Yoggie Gatekeeper Internet security devices – can now be downloaded as a VMware-based virtual appliance from […]

Astaro Publishes Network Security Tips

Tip sheet describes methods and techniques for protecting networks from cyber-attacks Astaro Corporation (, a leading network security vendor, today announced that Astaro has published a tip sheet detailing describing how organizations and individuals can protect their networks from cyber attacks. Astaro has made the tip sheet available at   Recent reports of cyber-attacks […]

Visit Our Sponsors