Printer Friendly

Browse Data security topic

Technology application subtopic

Articles

1-211 out of 211 article(s)
Title Author Type Date Words
Amid privacy concerns, cyber security expert says social media apps more intrusive than MySejahtera. Dec 5, 2020 678
Ensuring cybersecurity a key task in digital transformation. Nov 11, 2020 592
PacStar 451 with Juniper vSRX Virtual Firewall Okayed for US Government Classified Use. Oct 5, 2020 236
Thales to Accelerate Cloud and Digital Transformation Initiatives. Aug 13, 2020 231
A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT. Abed, Ahmed Mohsin; Boyaci, Ali Report Jul 14, 2020 3746
Vubiq Networks Protects RFID Innovation with New Patent Publication. Jun 24, 2020 273
Ooredoo sees strong demand for its cybersecurity solutions amid Covid-19 pandemic. Jun 15, 2020 378
Edinburgh tech start-up develops sensor that could help physical distancing; A technology start-up based at the Edinburgh Business School (EBS) Incubator at Heriot-Watt University has developed a sensor that could help physical distancing as lockdown eases. Scott Reid Jun 6, 2020 448
Cisco Live 2020 Digital Conference to Explore Security, Connectivity, Network Insights underway June 2-3. Conference notes Jun 3, 2020 159
AXA Ventures Leads $5M Investment in Cyber-Security Startup Hub Security. May 8, 2020 346
Govt seeks consultation on data protection bill. Ramsha Jahangir Apr 11, 2020 941
SpeQtral, ITB and Kennlines Capital Group, Signs Memorandum of Understanding to Develop Quantum Secure Networks in Indonesia to thwart Eavesdroppers. Feb 29, 2020 743
Promoting cybersecurity awareness in South Africa. Woody, Chickelle Feb 1, 2020 354
Firm is recognised for strong cyber security. Jan 23, 2020 165
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. Jan 7, 2020 286
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. Jan 7, 2020 286
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. Jan 6, 2020 286
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. Jan 6, 2020 286
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. Jan 6, 2020 271
Consumer Voice Apps and Smart Devices Lead the Way for Speech Tech: Interface and data security challenges remain, however. Kompella, Kashyap Jan 1, 2020 705
CYBER SECURITY. Diaz, Mario Jan 1, 2020 6530
Online guard greets hackers. DAVID WALKER Dec 28, 2019 463
FireMon's 2019 State of the Firewall Report Reveals Lack of Automation as Underlying Security Challenge in Digital Transformation Initiatives; Network Security Complexity and Lack of Visibility Result in Misconfigurations that Lead to Data Breaches ... Report Nov 12, 2019 1075
Banco BASE chooses Guardicore Centra security platform to provide advanced data center security. Oct 24, 2019 237
Banco BASE chooses Guardicore Centra security platform to provide advanced data center security. Oct 24, 2019 235
How to protect your data from unauthorized access. Sep 7, 2019 678
Emerson Helps Industry Enable Digital Transformation with New Cybersecurity Lab. Jul 30, 2019 431
A Quarter of People in EMEA Prefer Their Cybersecurity Managed by Artificial Intelligence. Barker, Jessica Jul 1, 2019 689
Challenging Outdated Technology. Cherry, Michael; Imwinkelried, Edward J.; Riley, Elven; Epstein, Jules; Switzer, Mark; King, Jack Jun 1, 2019 760
Belgian Cybersecurity Center Finds No Evidence of Huawei Spying Threat, Despite US Claims. Apr 16, 2019 318
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. Zhang, Meiyu; Zhang, Qianying; Zhao, Shijun; Shi, Zhiping; Guan, Yong Mar 31, 2019 8618
Mobile Banking Apps Prone To Cyber Attacks, Says Experts. Feb 4, 2019 461
A Behaviour Profiling Based Technique for Network Access Control Systems. Muhammad, Musa Abubakar; Ayesh, Aladdin Jan 1, 2019 5090
The Rise of Security Automation. Malcher, Michelle Dec 22, 2018 1953
USB devices 'pose huge security threat to industrial networks'. Dec 3, 2018 408
Quantum Cryptography: a new age in data security: Dr Andrew Shields highlights the importance of quantum cryptography in ensuring the future of data security. Shields, Andrew Dec 1, 2018 675
Cyber security, radiation threat echo in seminar on safe use of nuclear energy. Sep 13, 2018 354
Lock your digital treasures: why data encryption is vital for security. Sep 5, 2018 877
A10 Networks solution to secure next-gen 5G-ready network rollout. Jul 24, 2018 214
A10 Networks solution to secure next-gen 5G-ready network rollout. Jul 24, 2018 201
A10 Networks solution to secure next-gen 5G-ready network rollout. Jul 24, 2018 214
DarkMatter to protect Expo 2020 digital network. Jul 4, 2018 530
UAE cybersecurity firm to safeguard Expo 2020 digital network. Jul 4, 2018 518
UAE Cyber Security Firm DarkMatter to Protect Expo 2020's Digital Network and Data. Jul 4, 2018 542
ADVA brings secure zero touch provisioning to network edge device range. Jun 22, 2018 213
Companies to integrate innovative wireless IoT data security solution. Jun 19, 2018 275
Companies to integrate innovative wireless IoT data security solution. Jun 19, 2018 262
Companies to integrate innovative wireless IoT data security solution. Jun 19, 2018 275
SYNCSORT & COLLIBRA DELIVER AUTOMATED CONNECTIVITY. Jun 1, 2018 670
The Advancing: Electronic Battlefield: IN A RECENT EDITION OF THE CDR RADIO PODCAST, LEADING EXPERTS FROM KPMG EXPLAIN HOW CANADA'S MILITARY MUST TACKLE THE CYBER SECURITY THREAT, DIGITAL AUTOMATION AND MORE: Here, CDR's Ottawa Correspondent, James Careless, offers a re-cap of his in-depth conversation with the KPMG executives on the cyber security topic. You can listen to the full podcast at: www.CanadianDefenceReview.com. Careless, James Jun 1, 2018 1008
Facebook, Google, WhatsApp and Instagram already hit with GDPR complaints - but the tech giants aren't worried; Spokespeople for the tech giants have said they're fully compliant with the new regulations. Martyn Landi May 29, 2018 521
First-ever National Center for Cyber Security to be inaugurated today. May 21, 2018 102
Data Security - issue of morality, business ethics, or inept governance? May 10, 2018 1194
MHI and NTT Group Begin Sales of "InteRSePT" Cyber Security Technology Providing Safe and Secure Operation of Control Systemse. Apr 25, 2018 988
A Cloud of Hope for Shared Science. Blau, John Editorial Mar 1, 2018 1301
LDRA Helps Ensure Automotive Cybersecurity with Support for SAE J3061. Mar 1, 2018 870
THE FAR LIMITS OF AI-PART II. Castelluccio, Michael Jan 1, 2018 798
Validating User Flows to Protect Software Defined Network Environments. Abdulqadder, Ihsan H.; Zou, Deqing; Aziz, Israa T.; Yuan, Bin Jan 1, 2018 8744
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. Zhang, Pei; Zhang, Wenying Jan 1, 2018 5830
Much work needed as Pakistan ranked 67th in global cyber security index: moot told. Dec 17, 2017 533
Pakistan ranked 67th in Global Cyber Security Index-2017. Dec 17, 2017 1157
WoMaster Has Issued a New IIoT Brochure. Nov 29, 2017 401
MR J's TOP CONSUMER TIPS. Nov 26, 2017 793
Worry about risk management, not cyber attacks. Nov 21, 2017 546
Identity-Defined Networking. Nov 20, 2017 384
Cybersecurity company Tortuga Logic raises USD 2 mn in seed funding. Nov 18, 2017 217
Jentu Technologies Inc. Announces a Strategic Alliance with AVANT Secure PC to Create Secure Network Servers, End Points and IOT Solutions. Nov 12, 2017 788
Pacific Controls selects DigiCert to secure connected devices. Nov 7, 2017 394
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. Guo, Weipeng; Chen, Yonghong; Cai, Yiqiao; Wang, Tian; Tian, Hui Report Nov 1, 2017 6942
SquareWay to exhibit mobile communications security solutions. Oct 1, 2017 168
An Offline Srategy Of Securing A Confidential Data In A Misplaced Or Stolen Laptop And Track Back The Laptop With Location And Pictorial Metrics Of Unauthorised User. Ansiya, P. Infant; Mol, P. Sruthi; Dharmalingam, S. Report Aug 1, 2017 1987
Waterfall's Unidirectional Security Gateway fortifies the SCADA network. Jul 10, 2017 511
Waterfall's Unidirectional Security Gateway fortifies the SCADA network. Jul 10, 2017 511
Waterfall's Unidirectional Security Gateway fortifies the SCADA network. Jul 10, 2017 499
Demisto, Vectra Networks solution reduces security operations workload from days to minutes. Jul 5, 2017 242
Demisto, Vectra Networks solution reduces security operations workload from days to minutes. Jul 5, 2017 242
Demisto, Vectra Networks solution reduces security operations workload from days to minutes. Jul 5, 2017 226
The chief information security officer: the new CFO of information security. Lanz, Joel Jun 1, 2017 2972
Gartner identifies the top technologies for security in 2017. Jun 1, 2017 1112
Overcoming your insecurity: apartment management firms must remain diligent when it comes to cybersecurity. Norrick, Wanda Apr 1, 2017 553
Survey shows more than half of companies use biometric authentication. Brief article Jan 1, 2017 183
A New PDR Navigation Device for Challenging Urban Environments. Ortiz, Miguel; De Sousa, Mathieu; Renaudin, Valerie Jan 1, 2017 5130
India Earns a "B" in Overall Cybersecurity Confidence, Ahead of US and Canada. Dec 19, 2016 487
Global Cybersecurity Assurance Report Card Falls to 70 Percent with a "C-" Overall Grade for 2017. Report Dec 7, 2016 658
Belgium, Brazil, US, UK, Norway and More to Discuss Network Protection at European Smart Grid Cyber Security 2017. Nov 23, 2016 604
WISeKey to secure smart public lighting solution against hacking. Nov 16, 2016 331
Data exfiltration mitigation: Oak Ridge National Laboratory. Brief article Oct 1, 2016 136
Data-breach defense: Ernst & Young LLP. Brief article Oct 1, 2016 168
Holistic vulnerability analysis: Pacific Northwest National Laboratory. Brief article Oct 1, 2016 159
GPS cyber-attacks alert: Southwest Research Institute (SWRI). Brief article Oct 1, 2016 166
Biometrics will revolutionise how we protect our private data from theft, says UAE expert. Jun 30, 2016 714
Biometrics key to protecting data from theft; Axiom. Jun 30, 2016 526
Will artificial intelligence revolutionize cybersecurity? Jun 27, 2016 770
Will artificial intelligence revolutionize cybersecurity? Jun 27, 2016 809
Integrating fraud into data breach prevention. Bruemmer, Michael Jun 1, 2016 931
Investment professionals concerned with flaws in automated advice, mis-selling of financial advice, and data protection. May 1, 2016 381
Data Privacy Breaches: Organizing a Data Breach Incident-Response Team. Apr 11, 2016 1027
Data Privacy Breaches: Organizing a Data Breach Incident-Response Team. Apr 11, 2016 1065
USA to Provide Insight Into Cyber Security and Technological Systems at International Port Security 2016. Apr 7, 2016 594
IT risks that health care firms can overlook: network safeguards that can put into place to prevent illegal access to confidential information. Devogt, Chad Apr 1, 2016 736
3 cybersecurity threats to watch out for in 2016. Mar 25, 2016 462
IBM granted highest DoD authorization for cloud services. Brief article Mar 1, 2016 214
ReSec Technologies raises USD5m to fund cybersecurity efforts. Feb 25, 2016 153
ReSec Technologies raises USD5m to fund cybersecurity efforts. Feb 25, 2016 141
ReSec Technologies raises USD5m to fund cybersecurity efforts. Feb 25, 2016 153
HCC Embedded Safeguards Automotive Data by Bringing Verifiable TCP/IP, Encryption, and Reliable File Systems to OSEK-Based Applications. Feb 24, 2016 638
FirstBank chooses Entersekt to boost mobile banking security. Feb 17, 2016 271
FirstBank chooses Entersekt to boost mobile banking security. Feb 17, 2016 269
DATAGUISE DGSECURE SECURES RELATIONAL DATABASES. Jan 1, 2016 362
Ixia, StarLink to speed up delivery of network security solutions. Nov 3, 2015 214
Mobile and network data security: threats and strategies evolving with technology. Barbour, Tracy Nov 1, 2015 1630
Certes security solution blocks #1 hacking attack vector. Sep 4, 2015 253
Certes security solution blocks #1 hacking attack vector. Sep 4, 2015 253
Singapore Government upgrades security system to use VASCO 2-factor authentication. Mar 23, 2015 225
Singapore Government upgrades security system to use VASCO 2-factor authentication. Mar 23, 2015 223
SunBridge implements CipherCloud for Fujitsu. Dec 2, 2014 303
SunBridge implements CipherCloud for Fujitsu. Dec 2, 2014 294
SunBridge implements CipherCloud for Fujitsu. Dec 2, 2014 303
UK businesses re-think data protection strategy. Nov 1, 2014 346
Fujitsu Laboratories Develops Fast Recovery Process for Multiple Disk Failures. Oct 6, 2014 971
Barracuda Firewall features advanced application control. Jul 2, 2014 108
Barracuda Firewall features advanced application control. Jul 2, 2014 118
Barracuda Firewall features advanced application control. Jul 2, 2014 118
Command and control within the cyber awakening: OPNAV N2/N6's Matt Swartz talks about how the Navy gets enterprise right for the fleet. Anderson, Sharon Jul 1, 2014 1229
Sam's bolsters data security. Jun 23, 2014 173
Mining big gains from big data. Tuttle, Hilary Brief article Jun 1, 2014 196
Regional training program on nuclear plants' data security. May 12, 2014 309
Rockwell automation router offers VPN, firewall capabilities. Jan 1, 2014 359
TDAL: thoroughly data aggregation of low energy devices in secure heterogeneous wireless sensor networks. Engouang, Tristan Daladier; Liu, Yun; Zhang, Zhenjiang Jan 1, 2014 9119
Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho Report Jan 1, 2014 11067
New module protects automation networks. Nov 3, 2013 251
Should I build or buy my cybersecurity solution? Rosen, Michael Oct 1, 2013 1356
Opus Trust Group Selects Asigra Cloud Backup Connector Appliance to Simplify Enterprise Data Protection. Sep 27, 2013 700
SSDs Protected from Data Loss Due to Power Failure by Innodisk's Power Secure Technology. Sep 20, 2013 617
NHA chief for afforestation in hilly areas to protect road network. Sep 14, 2013 198
Researchers develop new system to verify cloud programmes function malware-free. Sep 12, 2013 273
Cyber security risks on the rise. Sep 3, 2013 595
Data use surge 'posing security challenges'. May 20, 2013 285
Data use surge 'posing security challenges'. May 20, 2013 307
All Points Works with Infoblox to Help Federal Government Agencies Automate and Secure Their Networks. Apr 12, 2013 198
Hitachi Develops Biometric Digital Signature Technology. Feb 26, 2013 423
Xerox, McAfee Demo New Method for Protecting Print Devices, Data from Malware. Conference notes Oct 26, 2012 437
COMSATS workshop calls for secure network infrastructure. Sep 26, 2012 227
Supply & installation of (a) communication instruments, information networks security instruments, also software licenses, (b) applications for scanning & identification of bugs in web programs, (c) renewal of users licenses & technical support for used s. Aug 8, 2012 208
Maintaining flexibility and data security. Nelson, Rick Jul 1, 2012 1352
Comprehensive Data Protection for VM Environments Using FarStone Software Solutions. Jun 22, 2012 241
Network and application security; fundamentals and practices. Book review Jun 1, 2012 131
Aruba simplifies IT management of employee-owned mobile devices. Feb 22, 2012 701
Yubico announces ARX CoSign digital signature function support for YubiKey. Feb 21, 2012 137
SafeNet Aids Fight Against eBanking Fraud with New Optical Signing Device. Jan 18, 2012 580
Can voice biometrics hack computer security? Speech technology can protect customer data against small-scale attacks. Klie, Leonard Dec 1, 2011 2621
Redefining the security wall: with the proliferation of web 2.0 apps and mobile devices, internet security requires more than a simple firewall. Hua, Vanessa Aug 1, 2011 1228
When it matters most: rugged computing devices and mobile health technologies enable safe and responsive care. Thompson, John Apr 1, 2011 673
SPAWARSYSCEN Atlantic provides capability driven, sustainable voice engineering solutions. Werner, Nick Company overview Apr 1, 2011 1708
HARD DRIVE CLONING SOFTWARE PROTECTS DATA FOR WINDOWS. Apr 1, 2011 393
GO-Global Cloud announced by GraphOn. Mar 29, 2011 247
ITT Interconnect Solutions Develops Permanent Downhole Gauge Connector to Protect Expensive Equipment and Vital Data in Harsh Environment Applications. Feb 17, 2011 294
Who Do You Trust? Using claims-based authentication and Web SSO takes the guesswork out of providing access to your applications. Rolich, Paul Jan 1, 2011 1873
Becrypt says its technology allows employees to work securely from home. Dec 1, 2010 152
Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk. Dec 1, 2010 854
Egress Switch Offers Deep Content Inspection to Help Automate the Detection of Sensitive Data. Nov 8, 2010 652
Thirtyseven4 Antivirus Selected to Protect the Panhandle Independent School District. Nov 4, 2010 402
Rootkit detection experiment within a virtual environment/Rootkit virusu aptikimo eksperimentas virtualioje aplinkoje. Toldinas, J.; Rudzika, D.; Stuikys, V.; Ziberkas, G. Report Oct 1, 2010 2723
SIGNiX and IDology Partner to Provide Verifiable Proof of Identity, Intent and Integrity within Digital Signatures. Jun 11, 2010 535
AppAssure's Backup and Disaster Recovery Software Helps Protect Healthcare Provider's Data. May 30, 2010 587
EMR data recovery can be challenging: newer data-protection technologies can help address the more stringent recovery requirements driven by EMR implementations. Burgener, Eric May 1, 2010 534
Data loss prevention solutions go head-to-head. Apr 6, 2010 336
Accenture opens cyber security "threat analysis center" in San Antonio. Brief article Apr 1, 2010 156
New multi-gigabit application Intelligent Firewall from Sonicwall secures the enterprise. Mar 29, 2010 827
New multi-gigabit application Intelligent Firewall from Sonicwall secures the enterprise. Mar 28, 2010 827
Hidden information with infraredesign. Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan Report Jan 1, 2010 1647
Secure convertible authenticated encryption scheme based on RSA. Wu, Tzong-Sun; Lin, Han-Yu Report Nov 1, 2009 4203
Texas A&M University at Galveston implements Palo Alto firewalls. Oct 7, 2009 123
HP upgrades Unix platform with data protection. Sep 28, 2009 350
HP upgrades Unix platform with data protection. Sep 27, 2009 350
SUMMA HEALTH SYSTEM IMPLEMENTS SENTILLION'S CLINICAL WORKSTATION. Sep 1, 2009 612
Mashreq Bank Implements Internet banking security solution. Aug 30, 2009 522
NCR's Advanced Store POS solution achieves Payment Application Data Security Standard acceptance. Aug 27, 2009 134
Aladdin eToken devices implemented by Croatian Zagrebacka bank. Jun 16, 2009 250
British public school implements Palo Alto firewall solution. Apr 22, 2009 153
Piedmont Credit Union deploys new software. Apr 15, 2009 205
Facebook training wheels: a secured social networking site allows schools to incorporate the technology into academics while preparing students for the perils of online communities. Demski, Jennifer Apr 1, 2009 1692
Five reasons to review data protection and business continuity implementations. Reynier, Philippe Sep 1, 2008 1620
Juniper Networks Announces Next Generation SSL VPN Appliances. Apr 15, 2008 810
Network appliance board for UTM, VPN and firewall applications. Mar 1, 2008 107
Network security software. Mar 1, 2008 91
Beyond compliance: protecting sensitive data on the mainframe environment: in the light of the British Government data loss, part two of a rather poignant feature from Ulf T. Mattsson, chief technology officer for data security management provider, Protegrity. Mattsson, Ulf T. Dec 1, 2007 5253
Back up the virtual machine: software as a service is one option for providing data recovery. Heitmann, Richard Oct 1, 2007 886
ESI/SmartBUY acquisition strategies for data at rest encryption: DON, Air Force and Army announce they are developing service-unique strategies to reap even greater enterprise savings. Anderson, Sharon Oct 1, 2007 719
AT&T expands Internet Protect service to Canada and Latin America. Brief article Sep 21, 2007 263
Remote backup solution. Brief article Sep 1, 2007 85
Disaster-recovery solution. Brief article Aug 1, 2007 91
The data center paradox: increasing security at the expense of network performance or compliance is not acceptable. Siket, Jarrod J.S. Jul 1, 2007 1264
PRIVACY PROTECTION : COMMISSION PUSHES NEW TECHNOLOGIES. May 3, 2007 542
Should you consider outsourcing? Schuchman, Martin Dec 1, 2006 670
Are biometrics the key to data security? Earley, Mark Sep 1, 2006 2467
Radio modules. Jul 1, 2006 1386
CONTINUUM DEBUTS NC-1100 WEB APPLICATION FIREWALL/GATEWAY. Jun 1, 2006 1258
PCIMMUNITY AUTOMATES/MAINTAINS COMPUTER SECURITY. Nov 1, 2005 448
JUSTICE AND HOME AFFAIRS: BIOMETRICS NO PANACEA, SAYS DATA PROTECTION SUPERVISOR. Oct 26, 2005 627
Security and compliance: danger lurks for stored data. Gauthier, Francois Oct 1, 2005 2042
Internet Security 2006 also spyware 2006. Sep 1, 2005 525
Automated patching: an easier approach to managing your network security. Schultze, Eric Apr 1, 2005 323
TERRORISM: DE VRIES SUGGESTS WAYS OF IMPROVING DATA SHARING AT NATIONAL LEVEL. Dec 22, 2004 389
The looming SAN storm in the SMB market part 2; continuation of the roundtable discussion on the emerging SAN market for small to medium-sized businesses sponsored by Computer Associates, Dell, Emulex, Intel and Microsoft. Panel Discussion Aug 1, 2004 2851
Secure, or paranoid? Irving, John Jun 1, 2004 2429
A new model for security: systems-based approach provides endpoint protection, while lowering overall costs. King, David May 1, 2004 1392
Banks get guideline for outsourcing IT security. Piazza, Peter Apr 1, 2004 298
Move beyond patch management: correlation threat-management engines can reduce the time needed to check syslog files. Hollows, Phil Jan 1, 2004 1130
A new approach to protecting data: Time Addressable Storage. Wadsworth, Kirby Dec 1, 2003 1177
Centrally managed network security: hope or reality? Don't wait for the standards to evolve. (Software Intelligence). Thomsen, Dan Feb 1, 2003 1055

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters