Home security
 

Keywords :   


Tag: security

Supervalu attack shows security challenge

2014-08-16 07:31:53| Grocery - Topix.net

That's what cyber security experts advised Friday after hackers breached computers at more than 1,000 grocery and liquor stores currently or formerly owned by Eden Prairie -based Supervalu .

Tags: security shows challenge attack

 

Infinite Security Solutions - To Infinity, and Beyond

2014-08-15 14:51:00| Offshore Technology

With extensive military experience and a comprehensive range of risk and security solutions for both land and sea, Infinite Security Solutions (ISS) has become a leading global player in safeguarding assets in high-risk areas.

Tags: security solutions beyond infinite

 
 

Cyber Security Software enables secure transfer of data.

2014-08-15 14:30:44| Industrial Newsroom - All News for Today

Integrated into ShareProtect secure file transfer application, ValidianProtect v2.1 provides secure access to, and transfer of, confidential digital information and data. Validian-enabled ShareProtect will help eliminate points of cyber attack by preventing, not just detecting, hacking or improper access of confidential digital information; encrypting data for transfer from point-of-inception to point-of-final-reception; and dynamically changing all information and crypto policies. This story is related to the following:Data Security Software

Tags: data software security transfer

 

Waterfall Security, Schneider Electric Join to Ensure Safety, Reliability of Control System Networks

2014-08-14 17:28:00| Transmission & Distribution World

Waterfall Security Solutions and Schneider Electric have announced a partnership to bring stronger-than-firewall cybersecurity technologies to Schneider Electric customers. read more

Tags: system join control security

 

The biggest iPhone security risk could be connecting one to a computer

2014-08-14 12:48:55| InfoWorld: Top News

Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect. Next Wednesday at the Usenix Security Symposium in San Diego, researchers with the Georgia Institute of Technology will show how iOS's Achilles' heel is exposed when devices are connected over USB to a computer or have Wi-Fi synching enabled.

Tags: to computer security risk

 

Sites : [488] [489] [490] [491] [492] [493] [494] [495] [496] [497] [498] [499] [500] [501] [502] [503] [504] [505] [506] [507] next »