Home security
 

Keywords :   


Tag: security

Public Wi-Fi Users Neglect Basic Security Precautions Against Hackers

2015-08-04 18:57:32| Wireless - Topix.net

You've come to expect it - free public Wi-Fi everywhere you go. But if that Wi-Fi hotspot you use is provided by a con artist, you could wind up paying a steep price for the Internet connection.

Tags: public users security basic

 

Fiber SenSys Receives GSN's 2015 Airport, Seaport, Border Security Award for Best Integrated Perimeter Protection Solution

2015-08-04 12:31:12| Industrial Newsroom - All News for Today

HILLSBORO, Ore. - Fiber SenSys, Inc., a leading global manufacturer of advanced fiber-optic sensors and integrated security systems, received the 2015 GSN Best Integrated Perimeter Protection Solution award in the category of Best Perimeter Protection, Fencing, Gates, and Guard Booths. This awards program was...

Tags: security protection solution award

 
 

Kaspersky Internet Security (2016)

2015-08-04 00:02:39| PC Magazine: New Product Reviews

There are no weak links in the protection offered by Kaspersky Internet Security (2016). All the components do a fine job, making this suite an Editors' Choice.

Tags: internet security internet security kaspersky

 

Security Management System scales to IoT edge devices.

2015-08-03 14:31:07| Industrial Newsroom - All News for Today

Designed to protect IoT and embedded devices against cyber-attack, Floodgate Security Manager can be operated as on-premise or cloud-based security manager. Software provides device status monitoring, security policy management, command audit logging, and security event logging and reporting for devices running Floodgate Agent or other lightweight IoT management protocols such as COAP and MQTT. Product helps achieve EDSA Certification and ISA/IEC 62443 Compliance.

Tags: system management security edge

 

Cyber Security Platform identifies operational threats.

2015-08-03 14:31:07| Industrial Newsroom - All News for Today

By providing up-to-date research results and discoveries, Industrial Threat Intelligence Platform enables utilities worldwide to identify malicious and operational threats. Services are based on insights derived from diverse sources: monitoring of real operational networks, forensics, and research. Also, platform publishes periodic and ad-hoc research based discoveries, threat alerts, and reports. Team also discloses vulnerabilities they discover to both ICS CERT and affected vendors.

Tags: security platform operational cyber

 

Sites : [323] [324] [325] [326] [327] [328] [329] [330] [331] [332] [333] [334] [335] [336] [337] [338] [339] [340] [341] [342] next »