Press Center

press-center-hero

Small business employees are happy overall

The survey highlights employee attitudes towards work and their use of technology and, of equal importance, their views of technology within a working environment.

Read the full story

  • Survey reveals 60 per cent increase in UK cyber security concern

    GFI Software™ today released the findings of an independent study examining the business and social impacts of cyber security issues, revealing stark public concerns over the increasing personal and business risks posed by cyber crime and the growing likelihood that cyber crime acts will escalate to physical retaliation.

  • US Cyber Security Survey: Fear of Cyber Crime Up 66 Percent

    GFI Software™ today released the findings of an independent study examining the business and societal impacts of cyber security issues, revealing stark concerns over the increasing personal and business risks posed by cyber crime and the growing likelihood that cyber crime acts will escalate to physical retaliation.

  • GFI Software™ Improves Missing Patch Detection, Vulnerability Assessment with LanGuard 2015™

    GFI Software™ today announced the release of GFI LanGuard 2015™, bringing a range of enhancements to the company’s award-winning network vulnerability scanning and patch management solution.

  • GFI Software Simplifies Multi Mail Server Management and Security with GFI MailEssentials 2015

    GFI Software™ today announced the release of GFI MailEssentials 2015, an evolution of the award-winning email security platform that adds major enhancements including scalability and load balancing capabilities to support organizations managing multiple mail servers.

  • GFI Software Unveils GFI Archiver 2015

    GFI Software™ today announced the availability of GFI Archiver 2015. Based on the award-winning functionality of GFI MailArchiver, GFI Archiver allows organizations to effectively manage all of their file, email and calendar histories through a central archiving tool, simplifying access and backup processes while reducing the risk of data loss and compliance breaches through failure to retain key information.

  • Social Navigation: City of Boston partners with Waze

    The idea of posting information in a social venue while driving would seem, on the face of it, to carry a lot of risk – but is Waze actually making the streets safer? The City of Boston seems to think so.
  • Managing your online persona(s)

    Many of us lead busy lives and managing your online person(s) might sound like just another chore that you don’t need. However, in today’s business and social environments, the time invested can save you a great deal of grief – or even help you land that dream job or meet Mr. or Mrs. Right.
  • Is it time for device vendors to stop “gifting” us with unwanted, risky software?

    A few days ago, Yahoo! Tech reported that Lenovo has been selling laptops that come pre-installed with malware created by a company called Superfish, which is designed to inject advertisements in the web browser but also compromises the certificate-based security protocols that enable computers to detect imposter web sites and can make the computers vulnerable to HTTPS man-in-the-middle (MITM) attacks.
  • Security 101: Authentication (Part 2)

    Welcome to part two of our three-part series on authentication. In this post we will review some of those that are used in networks.
  • Most vulnerable operating systems and applications in 2014

    An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.
  • Interpreting Data

    There is no way to determine a platform’s security based on raw data, as that data needs to first be put into context, applied to a scenario, and interpreted
  • Third Party Patch Roundup – February 2015

    February began with a new zero day Flash vulnerability, reports of DNS hijacking in DLink routers, and a new wave of ransomware. Meanwhile, software vendors scrambled to keep up, and given the smaller than usual slate of updates this month, it wouldn’t be surprising if March proves to be a busy month for patching.
  • Kaspersky Labs reports on unprecedented cyber robbery

    The details were revealed this week in a report from Kaspersky Labs, which first got involved in tracking down how the attacks were happening back in 2013 when an automatic teller machine in Kiev was compromised in a high profile incident in which the ATM began to dispense money without any user action.
  • February 2015 – Microsoft Patch Tuesday

    Of the nine security updates that were issued today, there are four remote code execution vulnerabilities, two security feature bypasses, and one escalation of privilege and Information disclosure. Only three of the nine are classified as critical; the rest are rated important.
  • Is there a severity greater than critical?

    It’s Patch Tuesday again and it’s really time you paid attention. A lot of attention. MS15-011 covers a security issue that, were I in charge of the ratings names, I would rate as Super-critical – because of the potential for exploitation more than its potential impact. If you have anyone taking a domain-joined workstation outside the corporate network, patch it now.

In the News

Press Releases