Home security
 

Keywords :   


Tag: security

DB Networks Names Database Security Veteran Gerry D'Agostino as VP of Business Development

2014-02-19 06:00:00| Industrial Newsroom - All News for Today

DB Networks&rsquo; Leadership Team Grows as Company Appoints Former RiskIQ and CebaTech Executive<br /> <br /> SAN DIEGO &ndash; DB Networks, an innovator of behavioral analysis in database security, today announced the appointment of information security industry veteran Gerry D&rsquo;Agostino as Vice President of Business Development. In this role, Mr. D&rsquo;Agostino will be responsible for the overall management of DB Networks&rsquo; business development organization, including strategic ...

Tags: business development security database

 

iPhone-Connected Jewelry: Wireless Security Alerts, High Fashion

2014-02-19 04:53:38| Wireless - Topix.net

Truly practical wearable technology, the kind that seamlessly disappears into your everyday life, is rare at the moment.

Tags: high security jewelry fashion

 
 

Founders of security startup SlickLogin join Google

2014-02-18 16:58:27| InfoWorld: Top News

The team at SlickLogin, a company working on technology for online authentication using sounds from a mobile phone, said it has joined Google.

Tags: join google security startup

 

How the NIST cyber security framework can help secure the enterprise

2014-02-18 13:40:18| InfoWorld: Top News

Now that the National Institute of Standards and Technology has finalized the much-discussed cyber security framework, organizations can use it as the guideline for measuring how well their systems are secured. 

Tags: the security secure enterprise

 

IBM Announces Security Forensics Capabilities to Help Protect Critical Data

2014-02-18 06:00:00| Industrial Newsroom - All News for Today

New analytics and automation helps any IT security team quickly identify and defend against hidden threats<br /> <br /> ARMONK, N.Y. &ndash; IBM (NYSE: IBM) today announced a powerful appliance for helping organizations diagnose and defend their critical data and enterprise networks against sophisticated external attacks and unauthorized insider activities.<br /> <br /> Since 2010, the IBM X-Force Trend & Risk Report has been reporting on the alarming rate of how cyber attacks continue to ...This story is related to the following:Database Management Software | Forensic Software |

Tags: data security critical protect

 

Sites : [587] [588] [589] [590] [591] [592] [593] [594] [595] [596] [597] [598] [599] [600] [601] [602] [603] [604] [605] [606] next »