(ISC)2: software security. One can consider the information age as an extension of the industrial age, characterized by the focus on production of physical goods. Today...
Protecting against the weakest linkWikiLeaks has come to international prominence (or notoriety, depending on your perspective) for its work in publishing private, secret...
Starting in November 2009, coordinated covert and targeted cyberattacks have been conducted against global oil, energy, and petrochemical companies. These attacks have...
For secure remote maintenance and diagnosis of machines and systems via the Internet, Innominate has developed a highly-available 19-inch network security solution, which...
Even the best IT security technologies are useless if someone possesses the "triple threat" - the will, the means and the access to compromise sensitive company data. And...
In this article David Tomlinson, managing director for leading data security company, Data Encryption Systems (DES), takes a detailed look at how encryption can safeguard...
The world is affected by the four megatrends demographic change, urbanization, climate change and globalization. Building Technologies Division provided answers at the...
SCM Microsystems, provider of solutions for secure access, secure identity and secure exchange, and Bluehill ID AGannounced that the transaction to combine their...