Cybersecurity

  • Showing 101-150 of 374 items
  • <<
  • ...
  • 2
  • 3
  • 4
  • ...
  • 8
  • >>
  1. Is Yahoo's Latest Hacking Problem a Deal Killer?

    Yahoo is telling customers to reset passwords. Could this spell the end of its Verizon deal?
  2. Yahoo Discloses New 1 Billion Account Breach (VZ, YHOO)

    Yahoo disclosed another massive data breach, this time of more than one billion customers, which could be the nail in the ...
  3. Hackers Steal Medical Records from Quest Diagnostics (DGX)

    Quest Diagnostics is the latest company to disclose it was the victim of a hack, putting information on around 34,000 individuals ...
  4. Symantec in Patent Infringement Case Against Rival

    A lawsuit asserts that Zscaler Inc. has infringed on at least seven of Symantec's patents.
  5. KKR Buys Optiv Security from Private Equity Fund (KKR)

    With Optiv boasting a three-year growth rate of 97%, KKR sees it as a strong asset.
  6. Your Cybersecurity Program: Legal Considerations

    Nearly every financial institution has experienced some sort of cyberattack over the last few years. It pays to create a ...
  7. American Express Acquisition Boosts Fraud Protection (AXP)

    American Express, which acquired fraud prevention software specialist InAuth, had been familiar with the company throughout ...
  8. Cisco Systems’ 2 Growth Markets for 2017 (CSCO)

    As the tech firm counters consecutive declines in its legacy hardware business, Cisco will push ahead into the emerging cybersecurity ...
  9. Behind LifeLock’s Almost 50% Rise (LOCK, SYMC)

    Symantec's $2.3 billion deal to acquire the identity and fraud protection firm will pair its declining PC sales with LifeLock's ...
  10. FireEye Reveals Its New Integrated Helix Platform

    FireEye (NASDAQ: FEYE) recently unveiled Helix, an integrated platform that bundles its security products -- network, endpoint, ...
  11. Analysts Take on Symantec Stock (SYMC)

    Investors demonstrate approval with the cybersecurity pioneer's recent acquisitions, while analysts recommend an average ...
  12. The IoT Revolution Behind the Push for 5G

    Chipmakers, networking providers and telecom firms are investing in the backbone of the IoT revolution, set to revolutionize ...
  13. Behind Symantec’s Recent Buyout Spree (SYMC, LOCK)

    The cybersecurity pioneer's acquisition of Blue Coat bolsters its enterprise cloud offerings, while LifeLock secures its ...
  14. Elliot Mgt Holds Sway Over Symantec (SYMC, LOCK)

    The investment firm has spurred the cybersecurity leader's two largest acquisitions this year, benefiting two-fold with stakes ...
  15. Palo Alto Strengthens Ties With Amazon (PANW, AMZN)

    The next-gen cybersecurity firm teams with the leading cloud provider to automate cloud security deployment as enterprises ...
  16. Understanding the Current IoT Revolution

    While IoT devices have outnumbered people since 2008, the majority are still unfamiliar with the technology's influence on ...
  17. How Symantec Will Use LifeLock (LOCK, SYMC)

    The cybersecurity industry pioneer's acquisition of the fraud and identity theft protection firm will help bolster consumer ...
  18. Starboard Value Makes Huge Investment in Hewlett Packard (HPE, TRNC)

    Jeffrey Smith's Starboard Value bought up a stake in Hewlett Packard worth more than $124 million in the third quarter.
  19. This Malware Video Will Crash Your iPhone (AAPL)

    So maybe don't view the video below if you are viewing this on an iPhone
  20. Palo Alto Sinks 15% After Q3 Earnings (PANW)

    Despite disappointing investors with mixed fiscal Q1 results and weak Q2 guidance, analysts see the cybersecurity pioneer ...
  21. Cybersecurity Snapshot: What’s Ahead in 2017

    A surge in cybersecurity demand presents upside as large IT firms enter the market and spur consolidation, while pure plays ...
  22. Moody’s: Symantec Under Review (SYMC, LOCK)

    Moody's review will focus on the cybersecurity firms' prospects for de-leveraging and the integration of identity and fraud ...
  23. Cybersecurity: What You Need to Know to Stay Safe

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less ...
  24. How Electronic Communications Compliance Falls Short

    A new study finds that supervision of electronic communications at financial advisory firms is falling short, putting them ...
  25. Symantec Buying LifeLock in $2.3 Billion Deal

    LifeLock (NYSE: LOCK) will soon be under the umbrella of computer security specialist Symantec (NASDAQ: SYMC), which announced ...
  26. Cisco CEO: 'Look Beyond One Quarter' (CSCO)

    Cisco stock slumped due to weaker-than-expected guidance while Robbins assures investors have "a lot to be excited about," ...
  27. Cisco: Guidance Disappoints, Stock Falls (CSCO)

    Despite posting an earnings and revenue surprise in fiscal Q1, investors are placing more emphasis on the firm's negative ...
  28. Cisco Reports Q3, Stock Slumps After Hours (CSCO)

    Waning demand for the networking hardware giant's legacy businesses pulled revenue down, while the firm secured growth in ...
  29. How Advisors Can Use Tech to Capture Leads

    The majority of financial advisors may own CRM solutions, but relatively few effectively leverage the solutions to cultivate ...
  30. RBC: LifeLock Is Symantec’s Path to Mobile (SYMC)

    As the cybersecurity industry pioneer reportedly considers a bid for the identity theft protection platform, analysts foresee ...
  31. EA Victim of In-Game Purchase Hacker Scam (EA)

    A hacker trial over EA coins in its FIFA games kicked off Monday.
  32. John McAfee: Investopedia Profile

    Investopedia columnist and Principal of GVA Research David Garrity sat down with John McAfee.
  33. 6 International Travel Tips for Working on the Go

    Smartphones and cloud computing have enabled many to work virtually from abroad. Here are six tips to make it easier.
  34. 6 Features Your Primary Bank Should Have

    Certain banking features can make managing your finances easier, so it's important to choose carefully when opening a new ...
  35. Yahoo Discloses New Potential Breach (YHOO, VZ)

    Yahoo disclosed it is investigating a purported hack of a user's account. Yahoo said law enforcement started sharing information ...
  36. A 12-Step Plan for Better Advisor Cybersecurity

    Cybersecurity represents a growing risk for advisors. Here is a 12-step blueprint to implement a plan while also keeping ...
  37. FireEye Continues to Soar on Better Guidance

    Despite investors taking a short breather, FireEye (NASDAQ: FEYE) stock is still enjoying the fruits of its third-quarter ...
  38. What Financial Advisors Think of Donald Trump

    Based on personality, tax and economic policies, financial advisors are understandably split on Donald Trump. Here's what ...
  39. FireEye: Street Cautious Despite Q3 Surge (FEYE)

    As the cybersecurity software provider's stock surges over 15% after its Q3 earnings beat, analysts remain on the sidelines. ...
  40. FireEye Shares Soar on Q3 Earnings (FEYE)

    The cybersecurity software player's revenues miss expectations, while a better-than-expected loss is carried by cost cutting ...
  41. Symantec’s Upcoming Q3 Earnings Report (SYMC)

    Although the cybersecurity pioneer faces a crowded enterprise security market and declining PC demand, a restructuring may ...
  42. Check Point Software Rallies on Strong 4Q Earnings

    Shares of Check Point Software (NASDAQ: CHKP) rallied more than 4% on Monday after the cybersecurity company reported better-than-expected ...
  43. Google Warns of "Critical Vulnerability" in Windows (MSFT, GOOG)

    Things have gotten a little embarrassing for Microsoft.
  44. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict damage to a company by exploiting vulnerabilities in its ...
  45. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software to hold a user’s computer system hostage until a ransom ...
  46. Botnet

    A Botnet is a network of internet-connected devices that have been compromised by hackers without the knowledge of the legitimate ...
  47. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive information by an individual, group, or software system.
  48. Fortinet’s Q3 Earnings Beats Forecasts (FTNT)

    After a disappointing earnings warning in mid-October which sent the stock falling, investors are reassured by a shifting ...
  49. Yahoo Disclosed Content or Data of 7,779 Accounts This Year (YHOO, VZ)

    Yahoo!, Inc. on Thursday released its semi-annual transparency report. This is the first release since Reuters reported Yahoo ...
  50. Expert: St. Jude Heart Devices Can Be Hacked (STJ)

    St. Jude Medical's heart devices can be hacked, say cybersecurity experts.
  • Showing 101-150 of 374 items
  • <<
  • ...
  • 2
  • 3
  • 4
  • ...
  • 8
  • >>
Hot Definitions
  1. Drawdown

    The peak-to-trough decline during a specific record period of an investment, fund or commodity. A drawdown is usually quoted ...
  2. Inverse Transaction

    A transaction that can cancel out a forward contract that has the same value date.
  3. Redemption

    The return of an investor's principal in a fixed income security, such as a preferred stock or bond; or the sale of units ...
  4. Solvency

    The ability of a company to meet its long-term financial obligations. Solvency is essential to staying in business, but a ...
  5. Dilution

    A reduction in the ownership percentage of a share of stock caused by the issuance of new stock. Dilution can also occur ...
  6. Agency Problem

    A conflict of interest inherent in any relationship where one party is expected to act in another's best interests. The problem ...
Trading Center