je.st
news
Tag: security
Public Wi-Fi Users Neglect Basic Security Precautions Against Hackers
2015-08-04 18:57:32| Wireless - Topix.net
You've come to expect it - free public Wi-Fi everywhere you go. But if that Wi-Fi hotspot you use is provided by a con artist, you could wind up paying a steep price for the Internet connection.
Tags: public
users
security
basic
Fiber SenSys Receives GSN's 2015 Airport, Seaport, Border Security Award for Best Integrated Perimeter Protection Solution
2015-08-04 12:31:12| Industrial Newsroom - All News for Today
HILLSBORO, Ore. - Fiber SenSys, Inc., a leading global manufacturer of advanced fiber-optic sensors and integrated security systems, received the 2015 GSN Best Integrated Perimeter Protection Solution award in the category of Best Perimeter Protection, Fencing, Gates, and Guard Booths. This awards program was...
Tags: security
protection
solution
award
Kaspersky Internet Security (2016)
2015-08-04 00:02:39| PC Magazine: New Product Reviews
There are no weak links in the protection offered by Kaspersky Internet Security (2016). All the components do a fine job, making this suite an Editors' Choice.
Tags: internet
security
internet security
kaspersky
Security Management System scales to IoT edge devices.
2015-08-03 14:31:07| Industrial Newsroom - All News for Today
Designed to protect IoT and embedded devices against cyber-attack, Floodgate Security Manager can be operated as on-premise or cloud-based security manager. Software provides device status monitoring, security policy management, command audit logging, and security event logging and reporting for devices running Floodgate Agent or other lightweight IoT management protocols such as COAP and MQTT. Product helps achieve EDSA Certification and ISA/IEC 62443 Compliance.
Tags: system
management
security
edge
Cyber Security Platform identifies operational threats.
2015-08-03 14:31:07| Industrial Newsroom - All News for Today
By providing up-to-date research results and discoveries, Industrial Threat Intelligence Platform enables utilities worldwide to identify malicious and operational threats. Services are based on insights derived from diverse sources: monitoring of real operational networks, forensics, and research. Also, platform publishes periodic and ad-hoc research based discoveries, threat alerts, and reports. Team also discloses vulnerabilities they discover to both ICS CERT and affected vendors.
Tags: security
platform
operational
cyber
Sites : [323] [324] [325] [326] [327] [328] [329] [330] [331] [332] [333] [334] [335] [336] [337] [338] [339] [340] [341] [342] next »