Date | Title | Description |
11.06.2024 | KnowBe4 enhances platform with PhishER Plus Threat Intel | KnowBe4, renowned for providing the world’s largest platform for security awareness training and simulated phishing, has announced a significant enhancement to its services. The company has introduced PhishER Plus Threat Intel, a new featur... |
07.03.2024 | Кто витает в облаках, или Как хакеры атакуют MSP-провайдеров | Допустим, вы решили грабить банки. На дворе 2024-й и вы не спали в криокамере 50 лет, поэтому вряд ли пойдете искать револьвер и чулок на голову. Самый логичный путь — стать киберпреступником (или одуматься).
Но можно пойти еще дальше — ата... |
17.12.2023 | Holiday shopping safety: FIVE tips for secure online shopping | Here are online shopping tips to make sure your payments are secure.Photo: Tumisu/PIXABAY
In the midst of the festive season hustle and bustle, online shopping and traditional malls seize the spotlight, attracting crowds in search of holida... |
20.02.2023 | Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoint Security | Every enterprise is in an endpoint security arms race. Attackers adapt their tactics faster than the most advanced security teams can react. One of the most compelling insights from comparing successive editions of Gartner’s Hype Cycle for ... |
27.01.2023 | 10 steps every business can take to avoid a cybersecurity breach | Check out all the on-demand sessions from the Intelligent Security Summit here.
Businesses that survive cyberattacks understand that breaches are inevitable. That’s a strong motivator to make cyber-resilience and business recovery a core pa... |
13.12.2022 | Why the manufacturing sector must make zero trust a top priority in 2023 | Check out all the on-demand sessions from the Intelligent Security Summit here.
By making zero trust a high priority in 2023, manufacturers can close the IT and operational technology (OT) gaps that keep them open to attack. Despite million... |
23.11.2022 | Where CISOs are getting quick zero-trust wins today to save tomorrow’s budgets | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
To shield their budgets from further cuts, CISOs are goi... |
15.11.2022 | The manufacturing industry’s security epidemic needs a zero-trust cure | This article is part of a VB special issue. Read the full series here: Zero trust: The new security paradigm.
Manufacturers’ tech stacks and industrial control systems (ICS) were designed to deliver speed and transaction efficiency first, w... |
24.10.2022 | How self-healing endpoints are a solution to identities under siege | Register now for your free virtual pass to the Low-Code/No-Code Summit this November 9. Hear from executives from Service Now, Credit Karma, Stitch Fix, Appian, and more. Learn more.
>>Don’t miss our special issue: How Data Privacy Is... |
08.10.2022 | How Shadow-Banned Influencers Can Lift Their Ban | Share
Tweet
Share
Share
Email
Have you noticed lately that life on your social media accounts is somewhat slower than it once was? Perhaps you aren’t getting as many comments on your posts as you typically do; maybe you have fewer new follo... |
22.08.2022 | Why getting endpoint security right is crucial | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Most organizations are behind on hardening their endpoints with zero trust, enabling cyberattackers to use malicious sc... |
21.04.2022 | New platform aims to stop weaponization of phishing domains | New phishing sites are launched on a regular basis, even back in 2017 1.4 million were launching every month according to Webroot, and most of them exist for less than 24 hours.
This makes it hard for security teams to pre-empt attacks, but... |
15.04.2022 | 10 things CISOs need to know about zero trust | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Tech stacks that rely on trust make it easy for c... |
15.03.2022 | Webroot vs. Symantec: Endpoint security software comparison | Image: Adobe Stock
I’ve worked extensively with Symantec and Webroot products in my role as a Windows system administrator, and I’ve been consistently impressed with both. Security software must walk a fine line between commandeering suffic... |
19.10.2021 | Threat detection marketplace SOC Prime nabs $11.5M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
SOC Prime, a Boston, Massachusetts-based startup ... |
19.10.2021 | Threat detection marketplace SOC Prime nabs $11.5M | SOC Prime, a Boston, Massachusetts-based startup developing a threat detection marketplace, today announced that it closed an $11.5 million funding round led by DNX Ventures with participation from Streamlined Ventures and Rembrandt Venture... |
16.09.2021 | Cybersecurity is not a one-stop-shop | Since the start of the pandemic, the way business is conducted has changed permanently, with many workforces continuing to work remotely as restrictions have eased. As companies relax and rules have eased, life is expected to return to a fo... |
06.07.2021 | Open Text : How to select the best endpoint security solutions in 2021 | The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today, many large organizations are managing more than 50,000 individual endpoints, with some responsible fo... |
18.05.2021 | OPEN TEXT CORPORATION
Open Text : Addressing cyber resilience gaps across key infrastructure assets | The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past twelve months, ransomware has disrupted operations for supp... |
26.01.2021 | Social Media Cybercrime Reality Hits as North Korean Hacks Targeted Security Researchers | Sieeka Khan, Tech Times 26 January 2021, 09:01 am
(Photo : Pexels/Soumil Kumar) North Korean hacker target security researchers
A North Korean government hacking group has targeted numerous members of the cybersecurity community, thus engag... |
17.12.2020 | Influitive Announces its 2020 BAMMIE Award Winners | Every year we are awed by the strides our customers make in driving and delivering business impact through customer engagement and advocacy communities.
TORONTO (PRWEB) December 17, 2020
Influitive is thrilled to announce the winners of the... |
26.11.2019 | How cyberinsurance works to protect companies in case of a security breach | Image: wildpixel, Getty Images/iStockphoto
Insurance is a way of life for businesses, as it’s essential to protect company property and personnel. It can also help alleviate the pain of cybersecurity incidents, which can cost anywhere from ... |
29.10.2019 | Ransomware sees a revival in 2019's worst cybersecurity threats | Cybersecurity company Webroot has released its third annual Nastiest Malware list which shows ransomware making a comeback in addition to other threats.
Phishing and botnets are still popular attack methods and threats across the board are ... |
08.10.2019 | Cybercriminals increase use of trusted domains to trick victims | Nearly a quarter of malicious URLs are being hosted on trusted domains, as hackers know trusted domain URLs raise less suspicion among users and are more difficult for security measures to block.
This is one of the findings of the latest We... |
24.09.2019 | Why we get hooked by phishing attacks | What makes us click on phishing links? A new study from Webroot has surveyed 4,000 office professionals from the US, UK, Japan and Australia to find out.
While a majority (79 percent) of people report being able to distinguish a phishing me... |
08.05.2019 | Americans are overconfident about cybersecurity | A new study from Webroot that examines the cyber hygiene habits of 10,000 Americans, 200 in each state, reveals that 88 percent feel they take the right steps to protect themselves from cyberattacks.
However, just 10 percent scored 90 perce... |
14.03.2019 | Businesses plan to use more AI and machine learning in cybersecurity this year -- even though they don't understand it | The use of more artificial intelligence to improve security has been touted for a while. New research from Webroot reveals that a majority of business are now actively exploring the technology.
It finds 71 percent of businesses surveyed in ... |
28.02.2019 | Home endpoints twice as likely to be infected as businesses | Despite the fact that in recent months we've seen cybercriminals focusing their efforts on businesses, 68 percent of infections are seen on consumer endpoints, compared to 32 percent on business endpoints.
This is one of the findings of the... |
11.02.2019 | Term Sheet — Monday, February 11 | NOT SO CONFIDENT
Good morning, Term Sheet readers.
Paid Content You can't secure what you can't see From ExtraHop
This is how Mark S. DiSalvo, the president and CEO of business consulting firm Semaphore, described the results he received in... |
08.02.2019 | Carbonite to acquire endpoint security company Webroot for $618.5M | Carbonite, the online backup and recovery company based in Boston, announced late yesterday that it will be acquiring Webroot, an endpoint security vendor, for $618.5 million in cash.
The company believes that by combining its cloud backup ... |
17.01.2019 | Golpe de phishing promete mostrar quem visitou seu perfil do Facebook | Como descobrir se alguém visualizou seu perfil do Facebook? A resposta é simples: não há como saber. Ainda assim, diversos usuários procuram por esse recurso — que existia no finado Orkut — e acabam caindo em golpes pouco sofisticados. Avis... |
17.10.2018 | Webroot launches VPN to protect Wi-Fi users | Many people rely on connecting to Wi-Fi networks when they are out and about, but using public hotspots does present a significant security risk.
The best way to protect yourself is to use a VPN and cybersecurity company Webroot is launchin... |
26.06.2018 | SMBs are underprepared for cyberattacks | No business is immune from cyber attack, and smaller companies are often targeted as they lack the resources to put into first class protection.
A new survey by cybersecurity company Webroot of 600 IT decision makers (ITDMs) at small- to me... |
05.06.2018 | Florida residents have the worst cybersecurity habits in the US | A study by cybersecurity company Webroot in conjunction with the Ponemon Institute finds Florida to be the worst state in the US for cyber-hygiene.
Ponemon surveyed 4,000 people across the US about their cybersecurity knowledge and internet... |
22.03.2018 | Legacy defenses can't keep pace with new cyber threats | Attacks such as ransomware are able to bypass legacy security solutions because organizations are neglecting to patch, update, or replace their current products according to a new report.
The study from cyber security company Webroot also s... |
24.01.2018 | Ransomware happens -- get over it and be prepared | In its recent State of the Channel Ransomware Report, data protection firm Datto found that SMBs ponied up some $301 million to digital hostage takers over the course of the past year. According to the survey that claims to have spoken to s... |
14.12.2017 | Over 90 percent of security pros worry about cyber criminals using AI | While machine learning and artificial intelligence are becoming key to cyber security, a new survey shows that a majority of security professionals worry that the technology could be used against them.
The study by cyber security company We... |
27.08.2017 | Are you doing enough to address your risk? Here are a seasoned CISO’s fundamentals | Several years ago, I received an early-morning phone call at home from one of my security staff. Our security operations center had just contacted us, reporting anomalous data traffic. They believed we had several assets that were infected ... |
01.08.2017 | 71 percent of SMBs are not prepared for cyber security risks | Small and medium sized businesses increasingly feel that they're vulnerable to cyber threats but most aren't prepared to meet them.
A new survey from endpoint security specialist Webroot finds that 96 percent of businesses with 100 to 499 e... |
27.07.2017 | Top 100 Cybersecurity Startups in Q2 of 2017 | With Black Hat in full swing and global cyber attacks making headlines more often than the Kardashians, the cybersecurity discussion is trending up in the business world and beyond. Large companies, small startups, and overly trusting indiv... |
28.06.2017 | What You Need to Know About the Petya Ransomware Attack | Cybersecurity concerns, true to most experts' warnings, have appeared to increase over the last few years. This week, another wave of attacks swept the globe, indicating that the problem is continuing to get worse. Dubbed Petya, the attacks... |
24.09.2016 | M&A roundup - week ending 9/24/16 | Facebook bought Nascent Object; Airbnb acquired Trip4real; Google purchased Api.ai
Facebook acquired ,modular consumer electronics platform Nascent Objects. No financial terms of the deal were disclosed.
Baback Elmieh, CEO of Nascent Object... |
21.09.2016 | Malware attacks are declining but getting cleverer | In the first six months of 2016 users were twenty percent less likely to encounter malware than in the same period last year. But although attacks are decreasing they’re getting more sophisticated and often disappear within hours having ach... |
19.09.2016 | Colorado’s Webroot Buys CyberFlow Analytics, Expands in San Diego | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Not long after ViaSat (NASDAQ: VSAT) acquired San Diego-based LonoCloud in 2013, former LonoCloud executives Tom Caldwell and Hossein Eslambolchi met for coffee at the Special... |
23.08.2016 | Meet Monero, the Currency Dark Net Dealers Hope Is More Anonymous Than Bitcoin | Not even bitcoin is anonymous enough for some criminals on the dark net.
For years, the cryptocurrency has been the payment method of choice for people buying and selling drugs and other illegal items on the dark net. But it presents a doub... |
15.05.2016 | How threat intelligence sharing can help deal with cybersecurity challenges | Ben Dickson Contributor
Ben Dickson is a software engineer and the founder of TechTalks.
More posts by this contributor
Monetizing computing resources on the blockchain
Unlocking the potential of eye tracking technology
In the ever-shifting... |
12.05.2016 | New Webroot solution uses threat intelligence to secure IoT gateways | As the Internet of Things takes off, gateways are increasingly being used to connect legacy and next generation devices, but they often don't have the security features to protect critical infrastructure.
Endpoint security specialist Webroo... |
23.02.2016 | Endpoint specific malware renders signature detection useless | Signature-based security could be virtually useless as 97 percent of malware is unique to a specific endpoint says a new report.
This is among the findings of the latest annual Webroot Threat Brief which shows that today's threats are truly... |
09.12.2015 | SMBs lack the resources to protect themselves from cyber attacks | Only 37 percent of SMBs believe that their organizations are fully equipped to handle IT security according to a new survey.
The study by security company Webroot reveals that in most small to medium businesses, IT teams are expected to han... |
13.10.2015 | Everyone and Their Mother Is Worried About Getting Hacked | Everyone is getting hacked these days.
At the end of last year, my old colleague Christina Warren wrote that 2014 was the year large scale hacks became the norm. And that was before this year's hacks, which included the breaches of the US O... |
01.10.2015 | Top 5 Security Apps for Android Phones | Protecting your computers, tablets and phones from theft and hackers should be a priority, in order to keep your personal data falling into the wrong hands. If we look at the statistics, the number of smartphone users is expected to reach t... |
22.09.2015 | Your mother should know (how you use your computer at college) | A new report by internet security specialist Webroot on the eve of National Cyber Security Awareness Month (NCSAM) asked over 500 mothers with kids leaving for college this year about the security of their offspring's computers.
Among the f... |
04.09.2015 | Ten reasons threat intelligence is here to stay | Over the past couple of years, the volume and frequency of new malware and its variants has exploded. But it takes considerable time, effort and expertise to sift through data and transform it into pertinent information. So out with old and... |
04.08.2015 | Web isolation platform adds threat intelligence to improve accuracy | We reported on the Menlo Security Web Isolation Platform, which aims to eliminate threats before they reach the desktop, earlier this year.
Now Menlo Security is beefing up its offering, announcing a partnership with threat intelligence spe... |
13.07.2015 | How malware and gaming have grown up in parallel | Since the advent of personal computing, games and malware have developed more or less side by side. Today the world of gaming has become intertwined with malware as cyber criminals have turned game theft into something much more lucrative.
... |
02.05.2015 | 7 PC Security Practices to Safeguard Your Personal Info | There are many threats to your computer’s security. Don’t wait for an attack to strike: protect your computer with the best antivirus software you can find. Good PC security practices ensure that your personal information remains safe. Lear... |
02.05.2015 | 7 PC Security Practices to Safeguard Your Personal Info | There are many threats to your computer’s security. Don’t wait for an attack to strike: protect your computer with the best antivirus software you can find. Good PC security practices ensure that your personal information remains safe. Lear... |
22.04.2015 | Cybercrime gets smarter and more complex | There are 85,000 new malicious IPs launched every day and the top phishing targets are technology companies and financial institutions.
These are among the findings of a new report from threat intelligence and security company Webroot. The ... |
31.03.2015 | Enterprise security places increased reliance on threat intelligence | It's easier to combat security threats if you're prepared for them so it isn't perhaps surprising that security teams are increasingly turning to threat intelligence to stay ahead of the game.
A new report commissioned by endpoint protectio... |
04.03.2015 | MRG Effitas releases latest Online Banking Browser Security report | Security research company MRG Effitas has released its Q4 2014 Online Banking Browser Security report, awarding certification to the top four products: Kaspersky Internet Security, Quarri POQ, Webroot SecureAnywhere and Zemana Antilogger.
M... |
14.11.2014 | New cryptoware title borrows page from drug dealers | Enlarge
Webroot reader comments 118 with 69 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
In the 14 months following the advent of Cryptolocker, there has been a rash of malware copycats that also... |
03.10.2014 | Ransomware is an increasing security concern for IT professionals | There are always plenty of security concerns causing furrowed brows of IT professionals, but a survey shows that it is ransomware that is causing the biggest headaches at the moment. A survey carried out by Spiceworks and published by Webro... |
10.07.2014 | 95 percent of employers are concerned about security risks from BYOD | Allowing employees to use their own devices is an increasingly popular trend, but BYOD opens up security threats that can leave company data vulnerable. A new survey commissioned by security specialists Webroot looks at the reality of mobil... |
20.05.2014 | One of world’s more pricey trojans is veritable Swiss Army knife for Android | D-M Commons reader comments 34 with 29 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
A malicious app targeting Android users has grown so fully featured that researchers said it has become one of ... |
30.04.2014 | New Colorado Conference to Connect Top Startups with National VCs | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Some of Colorado’s heaviest hitters in the tech industry and in venture capital will be at Coors Field this summer, but they won’t be there to watch the Rockies.
Instead, they... |
08.01.2014 | Enhanced Protection for Mobile Devices: gateprotect upgrades Complete Security suite | Hamburg, January 8th 2014 – The German IT security specialist gateprotect is now offering an upgrade for its endpoint solution. “Complete Security – Mobile Protection” provides even better protection against evolving threats, malware and ma... |
31.12.2013 | 6 tech tricks for having a fun (and regret-free) New Year’s Eve | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Oh, New Year’s Eve, you difficult and fickle frie... |
28.10.2013 | Webroot Secures Future by Moving Consumer Anti-Malware Suite to Cloud | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
A few years back, the team at Webroot, a company that makes Internet security software, was at a crossroads.
Webroot was founded in Boulder, CO, in 1997 and had carved out a n... |
13.08.2013 | gateprotect and Webroot Partner to Deliver a Holistic Approach to Complete Security | Agreement Enables Innovative German Security Specialist to Deliver Real-Time Threat and Data Protection from Every Endpoint to any Network Boundary
Hamburg and Broomfield, Colo, USA, 13 August 2013 – German IT security specialist gateprotec... |
23.07.2013 | Equal-opportunity malware targets Macs and Windows | F-Secure reader comments 78 with 47 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Researchers have uncovered a family of malware that targets both Windows and OS X. Janicab.A, as the trojan is kno... |
06.08.2012 | Olympics Android app steals text messages, browsing history | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
With any major event these days, fake mobile applications are sure to turn up. Security researchers at Webroot found an Olympics applic... |
19.07.2012 | Free Webroot Tool Diagnoses PC Issues In Less Than 2 Minutes | Webroot® System Analyzer Scans an Entire System to Diagnose Vulnerabilities and Performance Issues
Bracknell UK – July 19, 2012 – Webroot, a leader in delivering Internet security as a service, today released Webroot® System Analyzer, provi... |
10.04.2012 | Risky Business: New Data from Webroot Uncovers Disconnects, Parallels Between Online and Offline Security Risks | Adults Feel Safer Meeting a Stranger in Person than Opening an Email Attachment from One
Bracknell, UK, April 10, 2012 - Using a computer without security is riskier than leaving your home or car unlocked, according to a new study from Webr... |
19.01.2012 | Webroot Makes Key Appointments to Drive Global Sales of Cloud Security Solutions | Technology Veterans Will Steer Aggressive International Market Growth and Business Expansion
Bracknell, UK – 19th January, 2012 – Webroot, a leader in delivering Internet security as a service, today announced two executive appointments to ... |
19.01.2012 | Webroot Engages Former Symantec Executive to Support Global Expansion | Industry Veteran Will Drive Aggressive Market Growth and Strategic Worldwide Business Development
London UK, January 19, 2012: Webroot, a leader in delivering Internet security as a service, today announced that it has engaged Dieter Giesbr... |
09.01.2012 | Samsung develops emotion-sensing smartphone | You are too angry to update Facebook, please try again later. Judging by an early prototype Samsung Galaxy S II developed by a wing of Samsung’s huge R&D group, your smartphone might soon block you from posting tweets and status updates... |
17.11.2011 | Festive gift buying goes mobile in 2011: Webroot Research | Purchases via mobile devices will more than double while the majority of users leave their data and devices exposed to security risks
Bracknell, UK, November 17, 2011 – The power and portability of smartphones and tablets will save time and... |
19.10.2011 | Webroot Appoints Jacques Erasmus Chief Information Security Officer | Ten-year Cyber-security Expert to Oversee Global Data Security Measures and Compliance
Bracknell, UK – October 19, 2011 — Webroot, the first Internet security service company, today announced the appointment of Jacques Erasmus as the compan... |
04.10.2011 | Webroot Delivers the Fastest, Lightest and Least Demanding Consumer Protection: Introducing Webroot® SecureAnywhere™ | Integrates Security for PC, Android and iOS Users with Simple, Centralised Management
Bracknell, UK. - October 4, 2011 - Webroot, the first Internet security service company, today introduced the consumer portfolio of Webroot® SecureAnywher... |
27.09.2011 | Webroot Enhances Hosted Web Filtering Services For Customers And Partners | Real-Time Service Updates Instantly Protect Internet Users from Malicious Sites and Zero-Day Threats
Bracknell, UK– September 27, 2011 — Webroot, the first Internet security service company, today announced enhancements to its hosted web fi... |
20.09.2011 | Only a Quarter of Employees Bypass Security Policies: Webroot Research | Report finds top brass spend more time than their employees planning personal activities
Bracknell, UK, September 20, 2011: – According to new research from Webroot, the first Internet security service company, only about 25 per cent of emp... |
16.08.2011 | Habits of Social Networkers: 54 Percent of Users are Addicted, Webroot Research Finds | Third annual report finds cybercrime on social networks continues to climb despite increased privacy and security measures
Bracknell, UK, 16th August, 2011 – With malware showing no signs of abating on social networks and continuous news of... |
02.08.2011 | Webroot Strengthens Its Banking Security Portfolio with the Introduction of Mobile Security | Webroot® Mobile Security applications provide protection for mobile banking customers against Zeus and the latest mobile banking malware
Bracknell, UK CO – August 2, 2011 - Webroot, the first Internet security service company, has today ann... |
23.06.2011 | New Appointment to Drive Financial Growth and Operational Efficiencies at Webroot | Bracknell, UK, June 23, 2011 — Webroot, the first Internet security service company, has appointed John Post to the new role of vice president of finance. An executive with more than 15 years of tax and finance experience, Post will oversee... |
01.06.2011 | Cloudmore chosen by Webroot as European Security-as-a-Service Master Reseller Partner | Bracknell, UK, 1 June 2011 - Webroot, the first Internet security service company, today signed a strategic partnership appointing Cloudmore as a Master Reseller partner. Cloudmore will offer Webroot’s Security Software-as-a-Service (SaaS) ... |
19.04.2011 | UK Companies Spend 18 Days A Month Maintaining On-Premise Security Solutions | New Research from Webroot Finds Organisations with Highly Mobile Workforces More Susceptible to Infections
Bracknell, UK – April 19, 2011 - UK organisations spend an average of 143 hours or 18 working days per month just managing on-site se... |
06.04.2011 | Hotspot Shield snags 1 million users overnight, proves privacy can be monetized | Political unrest quite literally turned Hotspot Shield into an international success story overnight.
During the Egyptian uprisings against deposed president Hosni Mubarak in January and February, AnchorFree's Hotspot Shield software went f... |
04.04.2011 | Webroot Introduces Smartphone and Tablet Security | Webroot® Mobile Security for Android Smartphones and Webroot® Tablet Security for Android Deliver Extensive Layers of Protection for the Android Platform
Bracknell, UK, April 4, 2011 – Webroot, the first Internet security service company, t... |
07.03.2011 | FirstBank Fights Back Against Cybercrime With Webroot Subsidiary Prevx | Powerful security software, Prevx SafeOnline, protects customers from increasingly intelligent online fraud attacks
Bracknell, 7th March 2011 – Webroot, the first Internet security service company, today announced that its subsidiary Prevx ... |
24.02.2011 | Webroot signs RMS IT Security as an Authorised Partner | Bracknell, UK, 24 February, 2011 - Webroot, the first Internet security service company, has today announced a new partnership with RMS IT Security, a leading IT security solutions provider. RMS IT Security will provide email and web securi... |
08.02.2011 | Webroot Appoints Jeff Santelices Vice President Of Worldwide Strategic Alliances | Former IBM Executive Will Grow Outbound OEM Relationships to Drive Aggressive Business Expansion
Bracknell, UK. - February 8, 2011 - Webroot, the first Internet security service company, today announced the appointment of Jeff Santelices as... |
19.01.2011 | Webroot Provides Channel Partners with Enhanced Email Security Management to Meet Growing Demand | Bracknell, January 19, 2011 – Webroot, the first Internet security service company, today announced the latest release of Webroot® Email Security Service. As managed service providers, systems integrators and other resellers often take on t... |
17.11.2010 | Webroot Releases Annual Holiday Cybersecurity Survey | Shoppers plan to buy more gifts online this year; some online habits hold steady while others worsen
Bracknell, UK – November 17, 2010 – Webroot, the first Internet security service company, today released the results of a survey exploring ... |
15.11.2010 | Webroot Research Shows Half of SMBs Block Employee Access to Facebook | Internet Security Service Provider Reveals how Social Networking has Impacted SMB Security in 2010
Bracknell, UK – 15 November, 2010 – New research commissioned by Webroot, the first Internet security service company, shows companies are be... |
01.11.2010 | Webroot Acquires Prevx | Two Cloud Security Leaders Join Forces to Transform How Security is Delivered
Bracknell, UK – 1 November, 2010 – Webroot, the first Internet security service company, today announced it has acquired Prevx, provider of the world’s most scala... |
17.09.2010 | Back To School: Trying Our Best To Stay Safe Online In 2010 | Students! As anyone on a Windows machine who has visited good ol’ CrunchGear in the past few weeks knows: the Internet can be a dangerous place. There’s malware everywhere, dumb, time-wasting YouTube videos are embedded all over the place, ... |
25.07.2010 | Security-as-a-Service Firm Introduces “Complete” Suite | Today Webroot, the security-as-a-service company, launched a new, more comprehensive security suite.
Called Webroot Internet Security Complete, the new product focuses on four elements: Faster new threat response due to Web-based platform, ... |
07.07.2010 | Webroot Acquires Hosted Internet Security Services Provider BrightCloud | Internet security company Webroot today announced it has acquired BrightCloud, a Web content classification and security services provider. Webroot aims to integrate BrightCloud’s technology with its own proprietary malware detection and se... |
25.05.2010 | Adobe Reader faces its first genuine competition from a free alternative | Download Nitro PDF Reader 1.1.1.13 from Fileforum now.
Even today, we tend to use the phrase "Adobe PDF" when referring to the Portable Document Format, despite the fact that Adobe released its ownership of the standard into the o... |
22.09.2009 | DEMOfall 09: Your guide to VentureBeat’s coverage | We’re in the middle of DEMOfall 09 today in San Diego, where 56 tech companies will launch new products, and another 14 will give sneak peeks of the products that they’re working on.
This probably hasn’t escaped your notice, since VentureBe... |