Printer Friendly

Browse Security management topic

Technology application subtopic

Articles

1-65 out of 65 article(s)
Title Author Type Date Words
POLICE WARN OVER MOTORHOME THEFTS. Feb 28, 2020 271
Ed Higgins, Spyglass Solution Sales Director, Catapult Systems to Speak at the Knowledge Group's Never Trust, Always Verify: Battling Sophisticated Cybersecurity Threats. Jan 10, 2020 583
Digital Defense, Inc. Technology Partnership with Cherwell Automates Prioritization and Response to Security Threats. Aug 23, 2019 469
SALTSTACK SECOPS DELIVERS CONTINUOUS COMPLIANCE. May 1, 2019 567
70% of U.K. Tech Pros Need to Develop Skills to Confidently Manage Environments by 2024: Solarwinds. Apr 1, 2019 1418
Quantum Cryptography: a new age in data security: Dr Andrew Shields highlights the importance of quantum cryptography in ensuring the future of data security. Shields, Andrew Dec 1, 2018 675
Sophos Brings Deep Learning Innovation to Gitex Technology Week 2018. Oct 10, 2018 582
Modified Advanced Encryption Standard Algorithm for Reliable Real-Time Communications. Eltatar, Mahmoud A.; Abu-Hudrouss, Ammar M. Sep 1, 2018 3918
Sinocloud Wisdom presents new AI check-in robot. May 16, 2018 234
Dubai bank goes live with cheque blockchain project. Apr 22, 2018 267
Emirates NBD rolls out blockchain-based cheques. Apr 16, 2018 326
Emirates NBD integrates blockchain technology into bank-issued cheques. Apr 15, 2018 344
West Midlands Police chief to meet motor firms over 'relay' car thefts; The April 12 security summit was organised in reaction to soaring vehicle thefts where criminals exploit 'keyless' technology to steal cars. Apr 8, 2018 493
Auto-configurable Security Mechanism for NFV. Kim, HyunJin; Park, PyungKoo; Ryou, Jaecheol Report Feb 1, 2018 3904
Police deployment increased to ensure strict security; DPO. Jan 30, 2018 126
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec. Yang, Ximin; Wang, Deqiang; Feng, Wei; Wu, Jingjing; Tang, Wan Jan 1, 2018 5536
LDRA Streamlines Automation for Software Safety and Security Compliance Management. Oct 25, 2017 771
NEC Face Recognition Reinforces Security at 23rd Summer Deaflympics. Jul 19, 2017 490
OSI Systems gets USD 24m in for security inspection systems. Jul 5, 2017 147
ThreatConnect enables organisations to orchestrate security across multiple environments: customers can now centrally manage their automated security workflows across cloud virtual and on premises environments. Jul 1, 2017 163
Gartner identifies the top technologies for security in 2017. Jun 1, 2017 1112
Farmers warned to be on their guard against hi-tech rural criminals. May 16, 2017 609
IXIA DEPLOYS END-TO-END VISIBILITY FOR PUBLIC CLOUD. May 1, 2017 767
Leading Global Bank uses Checkmarx Source Code to strengthen security. Mar 30, 2017 231
Leading Global Bank uses Checkmarx Source Code to strengthen security. Mar 30, 2017 229
Changing attitudes toward application security. Mar 1, 2017 473
Payments technology firm receives major certification. Sep 2, 2016 210
Ensuring Authentication and Security using Zero Knowledge Protocol for Wireless Sensor Network Applications. Mozumdar, Mohammad; Aliasgari, Mehrdad; Venkata, Sudheer Matta Veera; Renduchintala, Sai Santosh May 1, 2016 5643
On the Identification of Required Security Controls Suitable for Converged Web and Mobile Applications. Nyambo, Devotha; Yonah, Zaipuna; Tarimo, Charles Jan 1, 2016 7049
Safety, security of nuclear program fully ensured, Pak tells UN. Nov 19, 2015 144
DESIGN AND IMPLEMENTATION OF A MOBILE BASED GATE PASSING DETECTION METHOD. Report Aug 31, 2015 2959
Centric security management. Apr 23, 2015 649
Covert network analysis for key player detection and event prediction using a hybrid classifier. Butt, Wasi Haider; Akram, M. Usman; Khan, Shoab A.; Javed, Muhammad Younus Report Jan 1, 2014 7848
New technology beefs up security in Ford car. Aug 13, 2013 344
On the use of improved imaging techniques for the development of a multistatic three-dimensional millimeter-wave portal for personnel screening. Gonzalez-Valdes, Borja; Alvarez, Yuri; Martinez, Jose A.; Las-Heras, Fernando; Rappaport, Carey M. Report Jun 1, 2013 3899
After Newtown, districts around the country are turning to a variety of technological solutions to help protect their campuses. Waters, John K. Apr 1, 2013 2060
Critical infrastructure security; assessment, prevention, detection, response. Book review Apr 1, 2012 149
Privacy aware recommender service using multi-agent middleware --an IPTV network scenario. Elmisery, Ahmed M.; Botvich, Dmitri Report Mar 1, 2012 12367
Reducing size while improving functionality and safety in next-generation medical device design. Swift, Stephen J. Mar 1, 2012 675
An intelligent indoor surveillance system. Piltaver, Rok; Dovgan, Erik; Gains, Matjaz Report Sep 1, 2011 7106
The Little shop for apps: to cut costs and ensure security, companies adopt a retail model for distributing apps for mobile devices to their employees. Korolov, Maria Jul 1, 2011 414
SoThin Software Leverages Thin Client Technology to Lock Down the Desktop and Ensure Security. Oct 28, 2010 828
IntergraphA Public Safety and Security Software Aids Kingdom of Jordan in Incident Management and Homeland Security Initiatives. Sep 2, 2010 589
Do you have what it takes to pass your Payment Card Industry audit? Jul 1, 2010 1271
Homeland Security: Better Use of Terrorist Watchlist Information and Improvements in Deployment of Passenger Screening Checkpoint Technologies Could Further Strengthen Security. Feb 1, 2010 722
School Security Technologies. Schneider, Tod Author abstract Jan 1, 2010 216
Hidden information with infraredesign. Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan Report Jan 1, 2010 1647
Research on biometrical systems: an overview. Sulovska, Katerina; Adamek, Milan Report Jan 1, 2010 1545
Reading between the lines: biometric tools draw information from a person's identifying physical components, providing a virtually fail-safe level of protection for K-12 schools. Waters, John K. Cover story Oct 1, 2009 2782
NCR's Advanced Store POS solution achieves Payment Application Data Security Standard acceptance. Aug 27, 2009 134
SHAVLIK OPTIMIZES SERVER UPDATE PROCESS FOR STATE JUDICIAL SYSTEM. Jul 1, 2009 789
Endpoint security management. Brief article Jan 1, 2009 93
Beyond compliance: protecting sensitive data on the mainframe environment: in the light of the British Government data loss, part two of a rather poignant feature from Ulf T. Mattsson, chief technology officer for data security management provider, Protegrity. Mattsson, Ulf T. Dec 1, 2007 5253
Novell ZENworks endpoint security management. Aug 1, 2007 174
Fort Leavenworth employs low-cost security enhancement at access control points. Cashin, Eric; Weathersbee, Tim Mar 22, 2007 1002
Thales and CheckPhone to develop solutions for critical applications. Feb 16, 2007 191
Thales and CheckPhone to develop solutions for critical applications. Feb 16, 2007 193
Security management software. Dec 1, 2006 129
'Universal' ID card part of federal security upgrade. Gilmore, Gerry J. Nov 1, 2006 434
Skybox Security introduces Skybox View 3.0. Brief article Jul 26, 2006 129
Security decisions--sense beyond dollars. Rindner, Steven Jun 15, 2005 678
How companies can compete for contracts; more and more technology providers will be contracting with the department of Homeland Security. To be successful, they must know how to proceed. Housman, Rob; Anikeeff, Tony Jan 1, 2004 2836
The path to truth, so to speak. Gips, Michael A. Nov 1, 2003 748
Crisis software analyzed. (Tech Talk). Piazza, Peter Brief Article Mar 1, 2003 280
A judicious integration project: Integrating security systems requires careful planning and testing. One project taught a number of valuable lessons about avoiding system integration mistakes. (System Integration). Allen, Tom; Trimble, Derek Feb 1, 2003 2362

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |