je.st
news
Tag: security
DB Networks Names Database Security Veteran Gerry D'Agostino as VP of Business Development
2014-02-19 06:00:00| Industrial Newsroom - All News for Today
DB Networks’ Leadership Team Grows as Company Appoints Former RiskIQ and CebaTech Executive<br /> <br /> SAN DIEGO – DB Networks, an innovator of behavioral analysis in database security, today announced the appointment of information security industry veteran Gerry D’Agostino as Vice President of Business Development. In this role, Mr. D’Agostino will be responsible for the overall management of DB Networks’ business development organization, including strategic ...
Tags: business
development
security
database
iPhone-Connected Jewelry: Wireless Security Alerts, High Fashion
2014-02-19 04:53:38| Wireless - Topix.net
Truly practical wearable technology, the kind that seamlessly disappears into your everyday life, is rare at the moment.
Tags: high
security
jewelry
fashion
Founders of security startup SlickLogin join Google
2014-02-18 16:58:27| InfoWorld: Top News
The team at SlickLogin, a company working on technology for online authentication using sounds from a mobile phone, said it has joined Google.
Tags: join
google
security
startup
How the NIST cyber security framework can help secure the enterprise
2014-02-18 13:40:18| InfoWorld: Top News
Now that the National Institute of Standards and Technology has finalized the much-discussed cyber security framework, organizations can use it as the guideline for measuring how well their systems are secured.
Tags: the
security
secure
enterprise
IBM Announces Security Forensics Capabilities to Help Protect Critical Data
2014-02-18 06:00:00| Industrial Newsroom - All News for Today
New analytics and automation helps any IT security team quickly identify and defend against hidden threats<br /> <br /> ARMONK, N.Y. – IBM (NYSE: IBM) today announced a powerful appliance for helping organizations diagnose and defend their critical data and enterprise networks against sophisticated external attacks and unauthorized insider activities.<br /> <br /> Since 2010, the IBM X-Force Trend & Risk Report has been reporting on the alarming rate of how cyber attacks continue to ...This story is related to the following:Database Management Software | Forensic Software |
Tags: data
security
critical
protect
Sites : [587] [588] [589] [590] [591] [592] [593] [594] [595] [596] [597] [598] [599] [600] [601] [602] [603] [604] [605] [606] next »