Cybersecurity

Read: Feenics Achieves ‘Verified by Veracode’ Assurance Program Seal

Feenics Achieves ‘Verified by Veracode’ Assurance Program Seal

Participating in the program ensures that Feenics’ software meets a high standard of data-breach application security, reducing risk for the customer.

Read: ADT Partners With Phishing Defense Provider to Protect Enterprises, Midsize Companies

ADT Partners With Phishing Defense Provider to Protect Enterprises, Midsize Companies

The ADT Cybersecurity platform will be augmented by Cofense Triage, said to be the first phishing-specific automated incident response platform.

Read: ESX 2018 to Promote Competing at the Next Level

ESX 2018 to Promote Competing at the Next Level

The Electronic Security Expo will kick off June 19 in Nashville with an opening celebration from 6-7:30 p.m. Here is your preview to the event, including educational sessions, special attractions and other goings-on.

Read: DHS Reissues National Terrorism Advisory System Bulletin

DHS Reissues National Terrorism Advisory System Bulletin

The NTAS bulletin warns that military success against terror groups abroad could encourage people in the U.S. to plot attacks here rather than join groups overseas.

Read: SIA GovSummit to Examine Top Security Issues Facing Government Agencies

SIA GovSummit to Examine Top Security Issues Facing Government Agencies

The event will feature discussions with key stakeholders from government, industry, education and law enforcement and highlight topics such as the need for school security guidelines and standards.

Read: How CGL Tackles Challenge of Hiring, Retaining Top-Notch Techs

How CGL Tackles Challenge of Hiring, Retaining Top-Notch Techs

CGL Technologies President John Nemerofsky believes in a proactive approach to attract, hire and retain technicians. It’s a well thought-out, strategic process that can help other security dealers and systems integrators that struggle with a limited talent pool.

Read: March Networks Attains Certification for Cybersecurity Best Practices

March Networks Attains Certification for Cybersecurity Best Practices

Cyber Essentials certification is awarded to organizations able to demonstrate good cybersecurity practices and an ability to mitigate risks from Internet-based threats.

Read: Cyber:Secured Forum Keynotes to Detail Cyber Threat Landscape

Cyber:Secured Forum Keynotes to Detail Cyber Threat Landscape

Bob Troyer and Judy Smith of the Colorado U.S. Attorney’s Office will discuss cybercrime trends and developments at the inaugural Cyber:Secured Forum, to be held June 4-6 in Denver.

Read: Utilize Managed Services Providers to Better Serve Clients’ Cyber Needs

Utilize Managed Services Providers to Better Serve Clients’ Cyber Needs

Protecting enterprise clients against cyber risks likely requires systems integrators to step into foreign territory. Managed services providers offer a reassuring hand by delivering IT expertise, lightening the workload and opening RMR streams.

Read: 6 Security Flaws That Led to the Destruction of the Death Star

6 Security Flaws That Led to the Destruction of the Death Star

Could better implementation of access control, cybersecurity and surveillance have prevented the downfall of the Galactic Empire?

1 35 36 37 38 39 68
Get Our Newsletters