Home security
 

Keywords :   


Tag: security

BT mends broken hearts with new security push

2014-05-09 02:00:00| Total Telecom industry news

U.K. operator moves security ops to Global Services, unveils Heartbleed fix and holds talks with connected car makers.

Tags: security broken push hearts

 

VIDEO: Security fears and the Nigerian economy

2014-05-08 23:12:33| BBC News | Business | UK Edition

Chris Ewokor has been examining what Nigeria's security concerns mean for investment in Africa's biggest economy.

Tags: video security economy fears

 
 

CIP-014: Understanding the Standard from a Physical Security, Compliance, Cybersecurity and Regulatory Perspective

2014-05-08 16:00:00| Transmission & Distribution World

In this webinar, Burns & McDonnell will explain the fast-tracked CIP-014-1 Physical Security Standard and provide you with a roadmap necessary for achieving success at your transmission substations and respective control centers. Location Online Webinar United States See map: Google Maps .social-bar ul, .social-bar ul ul { margin: 0; padding: 0; position: absolute; width: 694px; height: 80px; } .event-intro .imagefield { float: right; margin: 0 0 1em 1em; padding-top: 130px; width:280px; } EMAIL   Tweet In this webinar, Burns & McDonnell will explain the fast-tracked CIP-014-1 Physical Security Standard and provide you with a roadmap necessary for achieving success at your transmission substations and respective control centers. Burns & McDonnell professionals who are experienced in industry and physical security will discuss strategies and provide examples for managing CIP-014. Specific topics will include required risk assessment for identifying applicable transmission assets; implementation of required security plans; and essential elements in the third-party review process required by FERC in their March 7th letter to NERC.   Join Us For This Free Webinar!   Sponsored By: read more

Tags: standard security understanding physical

 

Network Cyber Security System uses bio-inspired technology.

2014-05-08 14:30:30| Industrial Newsroom - All News for Today

Using bio-inspired technology that mimics and applies autonomic fight-or-flight fear response mechanism of mammals to cyber defense, Perception™ provides neural network architecture designed to combat unknown and emerging threats. Network security system, while able to identify malicious activity and new attacks as they emerge, can also monitor for and detect any slow, unauthorized data exfiltration — even when obfuscation techniques are used to evade rules-based detection techniques. This story is related to the following:Anti-Virus Software |

Tags: system technology network security

 

Software Modules cut security application development time.

2014-05-08 14:30:30| Industrial Newsroom - All News for Today

With Secure-X modules, those developing radar and camera security solutions can integrate disparate sensor types into security surveillance solutions. Toolkit of software building blocks offers modules for radar acquisition, processing, scan conversion, tracking of radar and video targets, fusion, recording, and display. Secure-X is also available as ready-to-run surveillance application that integrates radar and video cameras with threat display, recording, and target tracking. This story is related to the following:Optics and PhotonicsSearch for suppliers of: Video Surveillance Equipment

Tags: time software development security

 

Sites : [541] [542] [543] [544] [545] [546] [547] [548] [549] [550] [551] [552] [553] [554] [555] [556] [557] [558] [559] [560] next »