A regularly updated directory of press releases related to cyber security.

 Trend Micro Provides IoT Buyer’s Guide for Holiday Shopping Security Concerns

DALLAS, November 22, 2016 –  Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today published “Internet of Things Buyer’s Guide for Smart Parents and Guardians” as part of an informative content package for holiday shoppers. Infographics and an interactive quiz are also available, highlighting product features that threat actors can…

 The Boston Globe Names CyberArk a Top Place to Work for 2016

NEWTON, Mass. – November 22, 2016 – CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, has been named one of the Top Places to Work in Massachusetts by The Boston Globe. CyberArk was named a Top Place to Work in the medium-sized company…

 Research Reveals Hacker Tactics: Cybercriminals Use DDoS as Smokescreen for Other Attacks on Businesses

Woburn, MA – November 21, 2016 – Kaspersky Lab today released findings from the 2016 Kaspersky Lab Corporate IT Security Risks survey1, which found that Distributed Denial of Service (DDoS) attacks are sometimes used by cybercriminals to distract businesses while hackers sneak in through the back door. Over half of businesses questioned (56 percent) are…

 Juniper Networks Announces Date and Webcast Information for Upcoming Investor Conferences in December 2016

November 21, 2016 SUNNYVALE, CA–(Marketwired – November 21, 2016) – Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, today announced the Company will present at the following investor conferences in December: Mike Marcellin, Senior Vice President and Chief Marketing Officer at Juniper Networks, will present at the Raymond James Technology…

 Emsisoft Beta updates – 2016-11-21

Emsisoft Anti-Malware & Emsisoft Internet Security 12.1.0.6936 – with BETA updates enabled: This update will require an application restart. Improved: Speed of scans. Improved: Basic support for Terminal Server. Improved: Status value in the ‘monitored’ column of the Behavior Blocker monitor. Improved: Archive scan results ‘cleanup’ processing. Improved: Application restart behavior. Fixed: Permissions for Exclusions and Notifications.

 Threat Stack Unveils Cloud Security Platform® (CSP) Support for Windows and Hybrid Environments

BOSTON – November 21, 2016 —  Threat Stack, a leader in Cloud Security and Compliance Management, today announced that it has extended the capabilities of the Threat Stack Cloud Security Platform® (CSP) to enable continuous security monitoring of Microsoft Windows and hybrid environments. The release of the new Windows agent adds to Threat Stack’s existing…

 OneLogin announces strategic partnership with NEC Solution Innovators to resell services in Japan

SAN FRANCISCO, Calif., November 21, 2016 – OneLogin, the identity management provider bringing speed and integrity to the modern enterprise, today announced that the company has signed a distribution agreement with NEC Solution Innovators to resell OneLogin services in Japan. Under terms of the agreement, NEC Solution Innovators will resell OneLogin services and provide first-level…

 Proofpoint to Present at Upcoming Conferences

SUNNYVALE, Calif., Nov. 21, 2016 (GLOBE NEWSWIRE) — Proofpoint, Inc. (NASDAQ:PFPT), a leading next-generation cybersecurity company, today announced its scheduled participation at the following upcoming conferences: Paul Auvil, chief financial officer, to present at the Credit Suisse 20th Annual Technology Conference  at 8:30 a.m. MST (7:30 a.m. PST) on Wednesday, November 30, 2016 in Scottsdale,…

 Check Point’s Global Threat Index Shows Malware Attacks are on the Rise

San Carlos, CA  —  Mon, 21 Nov 2016 Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today revealed the number of malware attacks increased in October, as the company released its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organizations’ networks. Check Point’s Threat Intelligence Research Team found that both the…