Jan. 15, 2010TopstoriesIT and IT-Security
Even the best IT security technologies are useless if someone possesses the "triple threat" - the will, the means and the access to compromise sensitive company data. And, as statistics unfortunately bear out, all too often that triple ...
Jan. 13, 2010TopstoriesIT and IT-Security
The world is affected by the four megatrends demographic change, urbanization, climate change and globalization. Building Technologies Division provided answers at the Siemens Airport Center to questions as to how people, the environment ...
Jan. 05, 2010TopstoriesIT and IT-Security
SCM Microsystems, provider of solutions for secure access, secure identity and secure exchange, and Bluehill ID AG announced that the transaction to combine their respective businesses has closed.
Jan. 01, 2010TopstoriesIT and IT-Security
In this article David Tomlinson, managing director for leading data security company, Data Encryption Systems (DES), takes a detailed look at how encryption can safeguard a company's reputation - and at the same time protect against ...
The latest information directly via newsletter.
See what next print issue of GIT SECURITY will cover:
All about: next official show app intersec Dubai by GIT SECURITY
Media Kits 2018 - download here