Title |
Author |
Type |
Date |
Words |
Amid privacy concerns, cyber security expert says social media apps more intrusive than MySejahtera. |
|
|
Dec 5, 2020 |
678 |
Ensuring cybersecurity a key task in digital transformation. |
|
|
Nov 11, 2020 |
592 |
PacStar 451 with Juniper vSRX Virtual Firewall Okayed for US Government Classified Use. |
|
|
Oct 5, 2020 |
236 |
Thales to Accelerate Cloud and Digital Transformation Initiatives. |
|
|
Aug 13, 2020 |
231 |
A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT. |
Abed, Ahmed Mohsin; Boyaci, Ali |
Report |
Jul 14, 2020 |
3746 |
Vubiq Networks Protects RFID Innovation with New Patent Publication. |
|
|
Jun 24, 2020 |
273 |
Ooredoo sees strong demand for its cybersecurity solutions amid Covid-19 pandemic. |
|
|
Jun 15, 2020 |
378 |
Edinburgh tech start-up develops sensor that could help physical distancing; A technology start-up based at the Edinburgh Business School (EBS) Incubator at Heriot-Watt University has developed a sensor that could help physical distancing as lockdown eases. |
Scott Reid |
|
Jun 6, 2020 |
448 |
Cisco Live 2020 Digital Conference to Explore Security, Connectivity, Network Insights underway June 2-3. |
|
Conference notes |
Jun 3, 2020 |
159 |
AXA Ventures Leads $5M Investment in Cyber-Security Startup Hub Security. |
|
|
May 8, 2020 |
346 |
Govt seeks consultation on data protection bill. |
Ramsha Jahangir |
|
Apr 11, 2020 |
941 |
SpeQtral, ITB and Kennlines Capital Group, Signs Memorandum of Understanding to Develop Quantum Secure Networks in Indonesia to thwart Eavesdroppers. |
|
|
Feb 29, 2020 |
743 |
Promoting cybersecurity awareness in South Africa. |
Woody, Chickelle |
|
Feb 1, 2020 |
354 |
Firm is recognised for strong cyber security. |
|
|
Jan 23, 2020 |
165 |
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. |
|
|
Jan 7, 2020 |
286 |
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. |
|
|
Jan 7, 2020 |
286 |
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. |
|
|
Jan 6, 2020 |
286 |
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. |
|
|
Jan 6, 2020 |
286 |
PenTera Chosen by Swedish Construction Group to Automate Cyber Security Validation. |
|
|
Jan 6, 2020 |
271 |
Consumer Voice Apps and Smart Devices Lead the Way for Speech Tech: Interface and data security challenges remain, however. |
Kompella, Kashyap |
|
Jan 1, 2020 |
705 |
CYBER SECURITY. |
Diaz, Mario |
|
Jan 1, 2020 |
6530 |
Online guard greets hackers. |
DAVID WALKER |
|
Dec 28, 2019 |
463 |
FireMon's 2019 State of the Firewall Report Reveals Lack of Automation as Underlying Security Challenge in Digital Transformation Initiatives; Network Security Complexity and Lack of Visibility Result in Misconfigurations that Lead to Data Breaches ... |
|
Report |
Nov 12, 2019 |
1075 |
Banco BASE chooses Guardicore Centra security platform to provide advanced data center security. |
|
|
Oct 24, 2019 |
237 |
Banco BASE chooses Guardicore Centra security platform to provide advanced data center security. |
|
|
Oct 24, 2019 |
235 |
How to protect your data from unauthorized access. |
|
|
Sep 7, 2019 |
678 |
Emerson Helps Industry Enable Digital Transformation with New Cybersecurity Lab. |
|
|
Jul 30, 2019 |
431 |
A Quarter of People in EMEA Prefer Their Cybersecurity Managed by Artificial Intelligence. |
Barker, Jessica |
|
Jul 1, 2019 |
689 |
Challenging Outdated Technology. |
Cherry, Michael; Imwinkelried, Edward J.; Riley, Elven; Epstein, Jules; Switzer, Mark; King, Jack |
|
Jun 1, 2019 |
760 |
Belgian Cybersecurity Center Finds No Evidence of Huawei Spying Threat, Despite US Claims. |
|
|
Apr 16, 2019 |
318 |
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. |
Zhang, Meiyu; Zhang, Qianying; Zhao, Shijun; Shi, Zhiping; Guan, Yong |
|
Mar 31, 2019 |
8618 |
Mobile Banking Apps Prone To Cyber Attacks, Says Experts. |
|
|
Feb 4, 2019 |
461 |
A Behaviour Profiling Based Technique for Network Access Control Systems. |
Muhammad, Musa Abubakar; Ayesh, Aladdin |
|
Jan 1, 2019 |
5090 |
The Rise of Security Automation. |
Malcher, Michelle |
|
Dec 22, 2018 |
1953 |
USB devices 'pose huge security threat to industrial networks'. |
|
|
Dec 3, 2018 |
408 |
Quantum Cryptography: a new age in data security: Dr Andrew Shields highlights the importance of quantum cryptography in ensuring the future of data security. |
Shields, Andrew |
|
Dec 1, 2018 |
675 |
Cyber security, radiation threat echo in seminar on safe use of nuclear energy. |
|
|
Sep 13, 2018 |
354 |
Lock your digital treasures: why data encryption is vital for security. |
|
|
Sep 5, 2018 |
877 |
A10 Networks solution to secure next-gen 5G-ready network rollout. |
|
|
Jul 24, 2018 |
214 |
A10 Networks solution to secure next-gen 5G-ready network rollout. |
|
|
Jul 24, 2018 |
201 |
A10 Networks solution to secure next-gen 5G-ready network rollout. |
|
|
Jul 24, 2018 |
214 |
DarkMatter to protect Expo 2020 digital network. |
|
|
Jul 4, 2018 |
530 |
UAE cybersecurity firm to safeguard Expo 2020 digital network. |
|
|
Jul 4, 2018 |
518 |
UAE Cyber Security Firm DarkMatter to Protect Expo 2020's Digital Network and Data. |
|
|
Jul 4, 2018 |
542 |
ADVA brings secure zero touch provisioning to network edge device range. |
|
|
Jun 22, 2018 |
213 |
Companies to integrate innovative wireless IoT data security solution. |
|
|
Jun 19, 2018 |
275 |
Companies to integrate innovative wireless IoT data security solution. |
|
|
Jun 19, 2018 |
262 |
Companies to integrate innovative wireless IoT data security solution. |
|
|
Jun 19, 2018 |
275 |
SYNCSORT & COLLIBRA DELIVER AUTOMATED CONNECTIVITY. |
|
|
Jun 1, 2018 |
670 |
The Advancing: Electronic Battlefield: IN A RECENT EDITION OF THE CDR RADIO PODCAST, LEADING EXPERTS FROM KPMG EXPLAIN HOW CANADA'S MILITARY MUST TACKLE THE CYBER SECURITY THREAT, DIGITAL AUTOMATION AND MORE: Here, CDR's Ottawa Correspondent, James Careless, offers a re-cap of his in-depth conversation with the KPMG executives on the cyber security topic. You can listen to the full podcast at: www.CanadianDefenceReview.com. |
Careless, James |
|
Jun 1, 2018 |
1008 |
Facebook, Google, WhatsApp and Instagram already hit with GDPR complaints - but the tech giants aren't worried; Spokespeople for the tech giants have said they're fully compliant with the new regulations. |
Martyn Landi |
|
May 29, 2018 |
521 |
First-ever National Center for Cyber Security to be inaugurated today. |
|
|
May 21, 2018 |
102 |
Data Security - issue of morality, business ethics, or inept governance? |
|
|
May 10, 2018 |
1194 |
MHI and NTT Group Begin Sales of "InteRSePT" Cyber Security Technology Providing Safe and Secure Operation of Control Systemse. |
|
|
Apr 25, 2018 |
988 |
A Cloud of Hope for Shared Science. |
Blau, John |
Editorial |
Mar 1, 2018 |
1301 |
LDRA Helps Ensure Automotive Cybersecurity with Support for SAE J3061. |
|
|
Mar 1, 2018 |
870 |
THE FAR LIMITS OF AI-PART II. |
Castelluccio, Michael |
|
Jan 1, 2018 |
798 |
Validating User Flows to Protect Software Defined Network Environments. |
Abdulqadder, Ihsan H.; Zou, Deqing; Aziz, Israa T.; Yuan, Bin |
|
Jan 1, 2018 |
8744 |
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. |
Zhang, Pei; Zhang, Wenying |
|
Jan 1, 2018 |
5830 |
Much work needed as Pakistan ranked 67th in global cyber security index: moot told. |
|
|
Dec 17, 2017 |
533 |
Pakistan ranked 67th in Global Cyber Security Index-2017. |
|
|
Dec 17, 2017 |
1157 |
WoMaster Has Issued a New IIoT Brochure. |
|
|
Nov 29, 2017 |
401 |
MR J's TOP CONSUMER TIPS. |
|
|
Nov 26, 2017 |
793 |
Worry about risk management, not cyber attacks. |
|
|
Nov 21, 2017 |
546 |
Identity-Defined Networking. |
|
|
Nov 20, 2017 |
384 |
Cybersecurity company Tortuga Logic raises USD 2 mn in seed funding. |
|
|
Nov 18, 2017 |
217 |
Jentu Technologies Inc. Announces a Strategic Alliance with AVANT Secure PC to Create Secure Network Servers, End Points and IOT Solutions. |
|
|
Nov 12, 2017 |
788 |
Pacific Controls selects DigiCert to secure connected devices. |
|
|
Nov 7, 2017 |
394 |
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. |
Guo, Weipeng; Chen, Yonghong; Cai, Yiqiao; Wang, Tian; Tian, Hui |
Report |
Nov 1, 2017 |
6942 |
SquareWay to exhibit mobile communications security solutions. |
|
|
Oct 1, 2017 |
168 |
An Offline Srategy Of Securing A Confidential Data In A Misplaced Or Stolen Laptop And Track Back The Laptop With Location And Pictorial Metrics Of Unauthorised User. |
Ansiya, P. Infant; Mol, P. Sruthi; Dharmalingam, S. |
Report |
Aug 1, 2017 |
1987 |
Waterfall's Unidirectional Security Gateway fortifies the SCADA network. |
|
|
Jul 10, 2017 |
511 |
Waterfall's Unidirectional Security Gateway fortifies the SCADA network. |
|
|
Jul 10, 2017 |
511 |
Waterfall's Unidirectional Security Gateway fortifies the SCADA network. |
|
|
Jul 10, 2017 |
499 |
Demisto, Vectra Networks solution reduces security operations workload from days to minutes. |
|
|
Jul 5, 2017 |
242 |
Demisto, Vectra Networks solution reduces security operations workload from days to minutes. |
|
|
Jul 5, 2017 |
242 |
Demisto, Vectra Networks solution reduces security operations workload from days to minutes. |
|
|
Jul 5, 2017 |
226 |
The chief information security officer: the new CFO of information security. |
Lanz, Joel |
|
Jun 1, 2017 |
2972 |
Gartner identifies the top technologies for security in 2017. |
|
|
Jun 1, 2017 |
1112 |
Overcoming your insecurity: apartment management firms must remain diligent when it comes to cybersecurity. |
Norrick, Wanda |
|
Apr 1, 2017 |
553 |
Survey shows more than half of companies use biometric authentication. |
|
Brief article |
Jan 1, 2017 |
183 |
A New PDR Navigation Device for Challenging Urban Environments. |
Ortiz, Miguel; De Sousa, Mathieu; Renaudin, Valerie |
|
Jan 1, 2017 |
5130 |
India Earns a "B" in Overall Cybersecurity Confidence, Ahead of US and Canada. |
|
|
Dec 19, 2016 |
487 |
Global Cybersecurity Assurance Report Card Falls to 70 Percent with a "C-" Overall Grade for 2017. |
|
Report |
Dec 7, 2016 |
658 |
Belgium, Brazil, US, UK, Norway and More to Discuss Network Protection at European Smart Grid Cyber Security 2017. |
|
|
Nov 23, 2016 |
604 |
WISeKey to secure smart public lighting solution against hacking. |
|
|
Nov 16, 2016 |
331 |
Data exfiltration mitigation: Oak Ridge National Laboratory. |
|
Brief article |
Oct 1, 2016 |
136 |
Data-breach defense: Ernst & Young LLP. |
|
Brief article |
Oct 1, 2016 |
168 |
Holistic vulnerability analysis: Pacific Northwest National Laboratory. |
|
Brief article |
Oct 1, 2016 |
159 |
GPS cyber-attacks alert: Southwest Research Institute (SWRI). |
|
Brief article |
Oct 1, 2016 |
166 |
Biometrics will revolutionise how we protect our private data from theft, says UAE expert. |
|
|
Jun 30, 2016 |
714 |
Biometrics key to protecting data from theft; Axiom. |
|
|
Jun 30, 2016 |
526 |
Will artificial intelligence revolutionize cybersecurity? |
|
|
Jun 27, 2016 |
770 |
Will artificial intelligence revolutionize cybersecurity? |
|
|
Jun 27, 2016 |
809 |
Integrating fraud into data breach prevention. |
Bruemmer, Michael |
|
Jun 1, 2016 |
931 |
Investment professionals concerned with flaws in automated advice, mis-selling of financial advice, and data protection. |
|
|
May 1, 2016 |
381 |
Data Privacy Breaches: Organizing a Data Breach Incident-Response Team. |
|
|
Apr 11, 2016 |
1027 |
Data Privacy Breaches: Organizing a Data Breach Incident-Response Team. |
|
|
Apr 11, 2016 |
1065 |
USA to Provide Insight Into Cyber Security and Technological Systems at International Port Security 2016. |
|
|
Apr 7, 2016 |
594 |
IT risks that health care firms can overlook: network safeguards that can put into place to prevent illegal access to confidential information. |
Devogt, Chad |
|
Apr 1, 2016 |
736 |
3 cybersecurity threats to watch out for in 2016. |
|
|
Mar 25, 2016 |
462 |
IBM granted highest DoD authorization for cloud services. |
|
Brief article |
Mar 1, 2016 |
214 |
ReSec Technologies raises USD5m to fund cybersecurity efforts. |
|
|
Feb 25, 2016 |
153 |
ReSec Technologies raises USD5m to fund cybersecurity efforts. |
|
|
Feb 25, 2016 |
141 |
ReSec Technologies raises USD5m to fund cybersecurity efforts. |
|
|
Feb 25, 2016 |
153 |
HCC Embedded Safeguards Automotive Data by Bringing Verifiable TCP/IP, Encryption, and Reliable File Systems to OSEK-Based Applications. |
|
|
Feb 24, 2016 |
638 |
FirstBank chooses Entersekt to boost mobile banking security. |
|
|
Feb 17, 2016 |
271 |
FirstBank chooses Entersekt to boost mobile banking security. |
|
|
Feb 17, 2016 |
269 |
DATAGUISE DGSECURE SECURES RELATIONAL DATABASES. |
|
|
Jan 1, 2016 |
362 |
Ixia, StarLink to speed up delivery of network security solutions. |
|
|
Nov 3, 2015 |
214 |
Mobile and network data security: threats and strategies evolving with technology. |
Barbour, Tracy |
|
Nov 1, 2015 |
1630 |
Certes security solution blocks #1 hacking attack vector. |
|
|
Sep 4, 2015 |
253 |
Certes security solution blocks #1 hacking attack vector. |
|
|
Sep 4, 2015 |
253 |
Singapore Government upgrades security system to use VASCO 2-factor authentication. |
|
|
Mar 23, 2015 |
225 |
Singapore Government upgrades security system to use VASCO 2-factor authentication. |
|
|
Mar 23, 2015 |
223 |
SunBridge implements CipherCloud for Fujitsu. |
|
|
Dec 2, 2014 |
303 |
SunBridge implements CipherCloud for Fujitsu. |
|
|
Dec 2, 2014 |
294 |
SunBridge implements CipherCloud for Fujitsu. |
|
|
Dec 2, 2014 |
303 |
UK businesses re-think data protection strategy. |
|
|
Nov 1, 2014 |
346 |
Fujitsu Laboratories Develops Fast Recovery Process for Multiple Disk Failures. |
|
|
Oct 6, 2014 |
971 |
Barracuda Firewall features advanced application control. |
|
|
Jul 2, 2014 |
108 |
Barracuda Firewall features advanced application control. |
|
|
Jul 2, 2014 |
118 |
Barracuda Firewall features advanced application control. |
|
|
Jul 2, 2014 |
118 |
Command and control within the cyber awakening: OPNAV N2/N6's Matt Swartz talks about how the Navy gets enterprise right for the fleet. |
Anderson, Sharon |
|
Jul 1, 2014 |
1229 |
Sam's bolsters data security. |
|
|
Jun 23, 2014 |
173 |
Mining big gains from big data. |
Tuttle, Hilary |
Brief article |
Jun 1, 2014 |
196 |
Regional training program on nuclear plants' data security. |
|
|
May 12, 2014 |
309 |
Rockwell automation router offers VPN, firewall capabilities. |
|
|
Jan 1, 2014 |
359 |
TDAL: thoroughly data aggregation of low energy devices in secure heterogeneous wireless sensor networks. |
Engouang, Tristan Daladier; Liu, Yun; Zhang, Zhenjiang |
|
Jan 1, 2014 |
9119 |
Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. |
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho |
Report |
Jan 1, 2014 |
11067 |
New module protects automation networks. |
|
|
Nov 3, 2013 |
251 |
Should I build or buy my cybersecurity solution? |
Rosen, Michael |
|
Oct 1, 2013 |
1356 |
Opus Trust Group Selects Asigra Cloud Backup Connector Appliance to Simplify Enterprise Data Protection. |
|
|
Sep 27, 2013 |
700 |
SSDs Protected from Data Loss Due to Power Failure by Innodisk's Power Secure Technology. |
|
|
Sep 20, 2013 |
617 |
NHA chief for afforestation in hilly areas to protect road network. |
|
|
Sep 14, 2013 |
198 |
Researchers develop new system to verify cloud programmes function malware-free. |
|
|
Sep 12, 2013 |
273 |
Cyber security risks on the rise. |
|
|
Sep 3, 2013 |
595 |
Data use surge 'posing security challenges'. |
|
|
May 20, 2013 |
285 |
Data use surge 'posing security challenges'. |
|
|
May 20, 2013 |
307 |
All Points Works with Infoblox to Help Federal Government Agencies Automate and Secure Their Networks. |
|
|
Apr 12, 2013 |
198 |
Hitachi Develops Biometric Digital Signature Technology. |
|
|
Feb 26, 2013 |
423 |
Xerox, McAfee Demo New Method for Protecting Print Devices, Data from Malware. |
|
Conference notes |
Oct 26, 2012 |
437 |
COMSATS workshop calls for secure network infrastructure. |
|
|
Sep 26, 2012 |
227 |
Supply & installation of (a) communication instruments, information networks security instruments, also software licenses, (b) applications for scanning & identification of bugs in web programs, (c) renewal of users licenses & technical support for used s. |
|
|
Aug 8, 2012 |
208 |
Maintaining flexibility and data security. |
Nelson, Rick |
|
Jul 1, 2012 |
1352 |
Comprehensive Data Protection for VM Environments Using FarStone Software Solutions. |
|
|
Jun 22, 2012 |
241 |
Network and application security; fundamentals and practices. |
|
Book review |
Jun 1, 2012 |
131 |
Aruba simplifies IT management of employee-owned mobile devices. |
|
|
Feb 22, 2012 |
701 |
Yubico announces ARX CoSign digital signature function support for YubiKey. |
|
|
Feb 21, 2012 |
137 |
SafeNet Aids Fight Against eBanking Fraud with New Optical Signing Device. |
|
|
Jan 18, 2012 |
580 |
Can voice biometrics hack computer security? Speech technology can protect customer data against small-scale attacks. |
Klie, Leonard |
|
Dec 1, 2011 |
2621 |
Redefining the security wall: with the proliferation of web 2.0 apps and mobile devices, internet security requires more than a simple firewall. |
Hua, Vanessa |
|
Aug 1, 2011 |
1228 |
When it matters most: rugged computing devices and mobile health technologies enable safe and responsive care. |
Thompson, John |
|
Apr 1, 2011 |
673 |
SPAWARSYSCEN Atlantic provides capability driven, sustainable voice engineering solutions. |
Werner, Nick |
Company overview |
Apr 1, 2011 |
1708 |
HARD DRIVE CLONING SOFTWARE PROTECTS DATA FOR WINDOWS. |
|
|
Apr 1, 2011 |
393 |
GO-Global Cloud announced by GraphOn. |
|
|
Mar 29, 2011 |
247 |
ITT Interconnect Solutions Develops Permanent Downhole Gauge Connector to Protect Expensive Equipment and Vital Data in Harsh Environment Applications. |
|
|
Feb 17, 2011 |
294 |
Who Do You Trust? Using claims-based authentication and Web SSO takes the guesswork out of providing access to your applications. |
Rolich, Paul |
|
Jan 1, 2011 |
1873 |
Becrypt says its technology allows employees to work securely from home. |
|
|
Dec 1, 2010 |
152 |
Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk. |
|
|
Dec 1, 2010 |
854 |
Egress Switch Offers Deep Content Inspection to Help Automate the Detection of Sensitive Data. |
|
|
Nov 8, 2010 |
652 |
Thirtyseven4 Antivirus Selected to Protect the Panhandle Independent School District. |
|
|
Nov 4, 2010 |
402 |
Rootkit detection experiment within a virtual environment/Rootkit virusu aptikimo eksperimentas virtualioje aplinkoje. |
Toldinas, J.; Rudzika, D.; Stuikys, V.; Ziberkas, G. |
Report |
Oct 1, 2010 |
2723 |
SIGNiX and IDology Partner to Provide Verifiable Proof of Identity, Intent and Integrity within Digital Signatures. |
|
|
Jun 11, 2010 |
535 |
AppAssure's Backup and Disaster Recovery Software Helps Protect Healthcare Provider's Data. |
|
|
May 30, 2010 |
587 |
EMR data recovery can be challenging: newer data-protection technologies can help address the more stringent recovery requirements driven by EMR implementations. |
Burgener, Eric |
|
May 1, 2010 |
534 |
Data loss prevention solutions go head-to-head. |
|
|
Apr 6, 2010 |
336 |
Accenture opens cyber security "threat analysis center" in San Antonio. |
|
Brief article |
Apr 1, 2010 |
156 |
New multi-gigabit application Intelligent Firewall from Sonicwall secures the enterprise. |
|
|
Mar 29, 2010 |
827 |
New multi-gigabit application Intelligent Firewall from Sonicwall secures the enterprise. |
|
|
Mar 28, 2010 |
827 |
Hidden information with infraredesign. |
Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan |
Report |
Jan 1, 2010 |
1647 |
Secure convertible authenticated encryption scheme based on RSA. |
Wu, Tzong-Sun; Lin, Han-Yu |
Report |
Nov 1, 2009 |
4203 |
Texas A&M University at Galveston implements Palo Alto firewalls. |
|
|
Oct 7, 2009 |
123 |
HP upgrades Unix platform with data protection. |
|
|
Sep 28, 2009 |
350 |
HP upgrades Unix platform with data protection. |
|
|
Sep 27, 2009 |
350 |
SUMMA HEALTH SYSTEM IMPLEMENTS SENTILLION'S CLINICAL WORKSTATION. |
|
|
Sep 1, 2009 |
612 |
Mashreq Bank Implements Internet banking security solution. |
|
|
Aug 30, 2009 |
522 |
NCR's Advanced Store POS solution achieves Payment Application Data Security Standard acceptance. |
|
|
Aug 27, 2009 |
134 |
Aladdin eToken devices implemented by Croatian Zagrebacka bank. |
|
|
Jun 16, 2009 |
250 |
British public school implements Palo Alto firewall solution. |
|
|
Apr 22, 2009 |
153 |
Piedmont Credit Union deploys new software. |
|
|
Apr 15, 2009 |
205 |
Facebook training wheels: a secured social networking site allows schools to incorporate the technology into academics while preparing students for the perils of online communities. |
Demski, Jennifer |
|
Apr 1, 2009 |
1692 |
Five reasons to review data protection and business continuity implementations. |
Reynier, Philippe |
|
Sep 1, 2008 |
1620 |
Juniper Networks Announces Next Generation SSL VPN Appliances. |
|
|
Apr 15, 2008 |
810 |
Network appliance board for UTM, VPN and firewall applications. |
|
|
Mar 1, 2008 |
107 |
Network security software. |
|
|
Mar 1, 2008 |
91 |
Beyond compliance: protecting sensitive data on the mainframe environment: in the light of the British Government data loss, part two of a rather poignant feature from Ulf T. Mattsson, chief technology officer for data security management provider, Protegrity. |
Mattsson, Ulf T. |
|
Dec 1, 2007 |
5253 |
Back up the virtual machine: software as a service is one option for providing data recovery. |
Heitmann, Richard |
|
Oct 1, 2007 |
886 |
ESI/SmartBUY acquisition strategies for data at rest encryption: DON, Air Force and Army announce they are developing service-unique strategies to reap even greater enterprise savings. |
Anderson, Sharon |
|
Oct 1, 2007 |
719 |
AT&T expands Internet Protect service to Canada and Latin America. |
|
Brief article |
Sep 21, 2007 |
263 |
Remote backup solution. |
|
Brief article |
Sep 1, 2007 |
85 |
Disaster-recovery solution. |
|
Brief article |
Aug 1, 2007 |
91 |
The data center paradox: increasing security at the expense of network performance or compliance is not acceptable. |
Siket, Jarrod J.S. |
|
Jul 1, 2007 |
1264 |
PRIVACY PROTECTION : COMMISSION PUSHES NEW TECHNOLOGIES. |
|
|
May 3, 2007 |
542 |
Should you consider outsourcing? |
Schuchman, Martin |
|
Dec 1, 2006 |
670 |
Are biometrics the key to data security? |
Earley, Mark |
|
Sep 1, 2006 |
2467 |
Radio modules. |
|
|
Jul 1, 2006 |
1386 |
CONTINUUM DEBUTS NC-1100 WEB APPLICATION FIREWALL/GATEWAY. |
|
|
Jun 1, 2006 |
1258 |
PCIMMUNITY AUTOMATES/MAINTAINS COMPUTER SECURITY. |
|
|
Nov 1, 2005 |
448 |
JUSTICE AND HOME AFFAIRS: BIOMETRICS NO PANACEA, SAYS DATA PROTECTION SUPERVISOR. |
|
|
Oct 26, 2005 |
627 |
Security and compliance: danger lurks for stored data. |
Gauthier, Francois |
|
Oct 1, 2005 |
2042 |
Internet Security 2006 also spyware 2006. |
|
|
Sep 1, 2005 |
525 |
Automated patching: an easier approach to managing your network security. |
Schultze, Eric |
|
Apr 1, 2005 |
323 |
TERRORISM: DE VRIES SUGGESTS WAYS OF IMPROVING DATA SHARING AT NATIONAL LEVEL. |
|
|
Dec 22, 2004 |
389 |
The looming SAN storm in the SMB market part 2; continuation of the roundtable discussion on the emerging SAN market for small to medium-sized businesses sponsored by Computer Associates, Dell, Emulex, Intel and Microsoft. |
|
Panel Discussion |
Aug 1, 2004 |
2851 |
Secure, or paranoid? |
Irving, John |
|
Jun 1, 2004 |
2429 |
A new model for security: systems-based approach provides endpoint protection, while lowering overall costs. |
King, David |
|
May 1, 2004 |
1392 |
Banks get guideline for outsourcing IT security. |
Piazza, Peter |
|
Apr 1, 2004 |
298 |
Move beyond patch management: correlation threat-management engines can reduce the time needed to check syslog files. |
Hollows, Phil |
|
Jan 1, 2004 |
1130 |
A new approach to protecting data: Time Addressable Storage. |
Wadsworth, Kirby |
|
Dec 1, 2003 |
1177 |
Centrally managed network security: hope or reality? Don't wait for the standards to evolve. (Software Intelligence). |
Thomsen, Dan |
|
Feb 1, 2003 |
1055 |