Law enforcement officials from around the globe ban together in hopes of at least putting a dent into this global threat.
- By Ginger Hill
- May 19, 2014
Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.
- By Ginger Hill
- May 01, 2014
ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
- By Ralph C. Jensen
- May 01, 2014
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014
"We are extremely proud of Leo and the incredible amount of time and effort he provides in support of our service men and women. His devotion to helping them transition from military life to professional civilian careers exemplifies our recognition of American freedoms and opportunities," said Daniel Krantz, CEO of Real-Time Technology Group.
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
Protect your digital life with this checklist of must-do security tasks.
- By Ginger Hill
- Apr 17, 2014
A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.
- By Ginger Hill
- Apr 16, 2014
Unique, event-based video discover platform coming to ISC West 2014.
Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
- By Ginger Hill
- Mar 06, 2014
Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.
- By Ginger Hill
- Mar 04, 2014
Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.
Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
- By Ginger Hill
- Feb 24, 2014
New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.
Is your city one of the first in America to host a Bitcoin ATM?
- By Ginger Hill
- Feb 18, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama
- By Ginger Hill
- Feb 13, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.
- By Ginger Hill
- Feb 12, 2014
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014