je.st
news
Tag: security
BT mends broken hearts with new security push
2014-05-09 02:00:00| Total Telecom industry news
U.K. operator moves security ops to Global Services, unveils Heartbleed fix and holds talks with connected car makers.
Tags: security
broken
push
hearts
VIDEO: Security fears and the Nigerian economy
2014-05-08 23:12:33| BBC News | Business | UK Edition
Chris Ewokor has been examining what Nigeria's security concerns mean for investment in Africa's biggest economy.
Tags: video
security
economy
fears
CIP-014: Understanding the Standard from a Physical Security, Compliance, Cybersecurity and Regulatory Perspective
2014-05-08 16:00:00| Transmission & Distribution World
In this webinar, Burns & McDonnell will explain the fast-tracked CIP-014-1 Physical Security Standard and provide you with a roadmap necessary for achieving success at your transmission substations and respective control centers. Location Online Webinar United States See map: Google Maps .social-bar ul, .social-bar ul ul { margin: 0; padding: 0; position: absolute; width: 694px; height: 80px; } .event-intro .imagefield { float: right; margin: 0 0 1em 1em; padding-top: 130px; width:280px; } EMAIL Tweet In this webinar, Burns & McDonnell will explain the fast-tracked CIP-014-1 Physical Security Standard and provide you with a roadmap necessary for achieving success at your transmission substations and respective control centers. Burns & McDonnell professionals who are experienced in industry and physical security will discuss strategies and provide examples for managing CIP-014. Specific topics will include required risk assessment for identifying applicable transmission assets; implementation of required security plans; and essential elements in the third-party review process required by FERC in their March 7th letter to NERC. Join Us For This Free Webinar! Sponsored By: read more
Tags: standard
security
understanding
physical
Network Cyber Security System uses bio-inspired technology.
2014-05-08 14:30:30| Industrial Newsroom - All News for Today
Using bio-inspired technology that mimics and applies autonomic fight-or-flight fear response mechanism of mammals to cyber defense, Perception™ provides neural network architecture designed to combat unknown and emerging threats. Network security system, while able to identify malicious activity and new attacks as they emerge, can also monitor for and detect any slow, unauthorized data exfiltration — even when obfuscation techniques are used to evade rules-based detection techniques. This story is related to the following:Anti-Virus Software |
Tags: system
technology
network
security
Software Modules cut security application development time.
2014-05-08 14:30:30| Industrial Newsroom - All News for Today
With Secure-X modules, those developing radar and camera security solutions can integrate disparate sensor types into security surveillance solutions. Toolkit of software building blocks offers modules for radar acquisition, processing, scan conversion, tracking of radar and video targets, fusion, recording, and display. Secure-X is also available as ready-to-run surveillance application that integrates radar and video cameras with threat display, recording, and target tracking. This story is related to the following:Optics and PhotonicsSearch for suppliers of: Video Surveillance Equipment
Tags: time
software
development
security
Sites : [541] [542] [543] [544] [545] [546] [547] [548] [549] [550] [551] [552] [553] [554] [555] [556] [557] [558] [559] [560] next »