UL’s new Cybersecurity Assurance Program assess software vulnerabilities and weaknesses, minimizes exploitation and more.
Popular Tags within: Network SecurityCyber Security Cyber Attacks Internet of Things Data Security Social Media Google
Genetec Security Center 5.7 adds many new features, including new cybersecurity, access control with HID mobile credentials and more.
Blockchain is receiving a ton of attention for what it can do from banking transactions to digital ledgers, but what about cyber security?
Ransomware hackers are targeting schools with weak cybersecurity, threatening to release sensitive student information unless a ransom is paid.
What types of cyberattacks were carried out this week, December 1, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.
A recent study by Kapersky Lab shows that most women aren’t attracted cybersecurity careers due to perception problems and lack of role models in the field.
What types of cyberattacks were carried out this week, November 24, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.
The Mississippi Community College Board (MCCB) is using new technology infrastructure to improve virtual learning. Deployment of the FlashStack converged infrastructure from Pure Storage and Cisco is enhancing MCCB’s data center infrastructure, reducing costs, and drastically improving enrollment experience and opportunities for its more than 70,000 students. The Tech Decision The MCCB provides centralized IT […]
VIPRE Security Chief Product Officer Usman Choudhary says interface and usability could be the most important aspect of the companies’ endpoint security solution.
Detector from RapidFire Tools will see lower acquisition cost, tools for defining and marketing service plans, and third party integration through update.