IT-Security

(ISC)2: software security

13.06.2012 -

(ISC)2: software security. One can consider the information age as an extension of the industrial age, characterized by the focus on production of physical goods. Today...

IT-Security

Information Security in the Age of WikiLeaks

11.03.2011 -

Protecting against the weakest linkWikiLeaks has come to international prominence (or notoriety, depending on your perspective) for its work in publishing private, secret...

IT-Security

Cyberattacks against global oil, energy, and petrochemical companies

10.02.2011 -

Starting in November 2009, coordinated covert and targeted cyberattacks have been conducted against global oil, energy, and petrochemical companies. These attacks have...

IT-Security

Highly available embedded server for secure teleservices

28.04.2010 -

For secure remote maintenance and diagnosis of machines and systems via the Internet, Innominate has developed a highly-available 19-inch network security solution, which...

IT-Security

Securing Security against the “Triple Threat”

15.01.2010 -

Even the best IT security technologies are useless if someone possesses the "triple threat" - the will, the means and the access to compromise sensitive company data. And...

IT-Security

Safeguarding Your Reputation

15.01.2010 -

In this article David Tomlinson, managing director for leading data security company, Data Encryption Systems (DES), takes a detailed look at how encryption can safeguard...

IT-Security

Integrated Total Solutions

15.01.2010 -

The world is affected by the four megatrends demographic change, urbanization, climate change and globalization. Building Technologies Division provided answers at the...

IT-Security

Bluehill ID and SCM Microsystems

05.01.2010 -

SCM Microsystems, provider of solutions for secure access, secure identity and secure exchange, and Bluehill ID AGannounced that the transaction to combine their...