Quick Links
News

< Back
Security : Technology : Data Protection : Rights Management
The only realistic way to avoid this malware driven breach is...
Data security expert Mark Bower, Vice President, Product Management & Solutions Architecture for Voltage Security recently commented on the “Backoff” retail malware that the U.S. Secret Service warned could have already affected 600 businesses:
Mark Bower
Vice President of Product Management
Voltage Security

read more >

Security : Technology : Analytics
> Enterprise Security Drives Analytics Enabled Security
> Splunk Drives Analytics-Enabled Security
> Deloitte Firms Win Two "Partner of the Year" Awards
Security : Technology : Artificial Intelligence
> World’s First Behavioral Recognition Analytics Platform
Security : Technology : Brand Integrity
> OpSec Security Selected for Online Brand Protection
Security : Technology : Data Protection
> CounterTack Extends Joins McAfee Security Innovation Alliance
> iSheriff Recognized by CRN as a 2014 Emerging Vendor
> NSA and Retail Breaches Influenced Corporate Security Strategies the Most
> Comprehensive File Storage Solution
> LG Partners With McAfee to Combat Mobile Device Theft and Resale
> Opportunities to Secure Mobile Networks and Protect Subscribers
> PCI Compliance Dashboard
> CyberArk CEO Udi Mokady Named an EY Entrepreneur of the Year
> Critical Communications Interoperable with GRC
> Data-centric Protection for Sensitive Data
  More Data Protection...
Security : Technology : Data Recovery
> Data Recovery Offer for Victims of Deadly Storms
Security : Technology : Email
> 2014 Starts with Record-Breaking Malware Traffic
> Halon Secure Load Balancer is Simple to Implement
> McAfee Named a Leader in Email Content Security
Security : Technology : Federal Information Processing Standard
> Level 2 Validation for Multi-Layer 10G Encryption
Security : Technology : Identity and Access Management
> Bringing Everyone into the Post Password Era
> Trends in Identity Management
> Learn How to Apply Intelligence to Identity Governance
> Vulnerability Data Refinery
> LogRhythm is a SIEM Leader
> DB Networks Honored as Gold Winner at the 9th Annual 2014 Hot Company
> "LogRhythm a Champion” in 2014-15 SIEM Vendor Landscape
> Empowering Organizations by Granting Appropriate Access to Needed Resources
> Ping Identity Named by Gartner
> 78% of IT Security Executives Anxious About Possibility Of A Data Breach
  More Identity and Access Management...
Security : Technology : Information Systems
> Five Principles for Effective Information and Technology Governance
> Organizations Not Prepared for Advanced Cyberthreats
> Cybersecurity Revised
> Cyber Squared Named “Hottest Bootstrap” Company in Washington D.C.
> CyberLympics World Finals to be Hosted in Barcelona
> Cyber Squared Launches ThreatConnect European Community
> Intellicheck Mobilisa Launches Fugitive Finder App for iPhone
> TriTech and Nlets to Introduce Cloud-based Public Safety Application
> Eliminate Silos and Extend Security Beyond IT
> McAfee Sets New Malware Protection Standard
  More Information Systems...
Security : Technology : Network
> 375 Million Customer Data Records Compromised in 2014
> Global Survey Reveals Impact of Data Breaches on Customer Loyalty
> TraceCSO Takes Home Silver and Bronze
> Intel Security Leads Secure Web Gateway Market
> Appsense Offers Virtualization Certification
> McAfee Positioned Again to Execute
> Simplifying GRC IT with TraceCSO
> Simplifying GRC
> The Next Evolution Of Cloud Security
> SafeNet Appoints Prakash Panjwani President and Chief Executive Officer
  More Network...
Security : Technology : Security Assertion Markup Language
> KnowledgeTree Reinforces Security with New Single Sign-On Tools
Security : Technology : Social Media
> Cyveillance Brings GRC To Social Media
Security : Technology : Software Development
> Ecosystem of Enterprise Security Software Providers
> Identity Safeguard and Locate Device
> JSSEC Releases English Version of Android Application Secure Design
> First Open Framework Cloud Test Platform
> World Class Web Acceleration Across India
> The Little Bits of Safety Critical Applications
> CA Technologies Completes Layer 7 Acquisition
> MetricStream Launches Zaplet
> CA Technologies to Acquire Layer 7
> Extend Integration by Verifying the Model at Object Code Level
  More Software Development...
Security : Technology : Transactions
> Optical Reader for Secure Transaction Authentication


Advertise your product/service here!
About Us Editorial

© 2019 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY