 
                    
                                        
		            
                    ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.
                    
			            - By Ralph  C. Jensen
- May 01, 2014
 
            
    
                
	                 
                    
                                        
		            
                    Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
                    
			            - By Eileen   Turner
- Apr 25, 2014
 
            
                
	                
                    
                                        
		            
                    "We are extremely proud of Leo and the incredible amount of time and effort he provides in support of our service men and women.  His devotion to helping them transition from military life to professional civilian careers exemplifies our recognition of American freedoms and opportunities," said Daniel Krantz, CEO of Real-Time Technology Group.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
                    
			            - By Yishay  Yovel
- Apr 18, 2014
 
            
                
	                 
                    
                                        
		            
                    Protect your digital life with this checklist of must-do security tasks. 
                    
			            - By Ginger  Hill
- Apr 17, 2014
 
            
                
	                 
                    
                                        
		            
                    A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone. 
                    
			            - By Ginger  Hill
- Apr 16, 2014
 
            
                
	                
                    
                                        
		            
                    Unique, event-based video discover platform coming to ISC West 2014.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
                    
			            - By Ginger  Hill
- Mar 06, 2014
 
            
                
	                 
                    
                                        
		            
                    Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
                    
			            - By Atchison   Frazer
- Mar 05, 2014
 
            
                
	                 
                    
                                        
		            
                    Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.
                    
			            - By Ginger  Hill
- Mar 04, 2014
 
            
                
	                 
                    
                                        
		            
                    Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
                    
			            - By Ginger  Hill
- Feb 24, 2014
 
            
                
	                 
                    
                                        
		            
                    New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Is your city one of the first in America to host a Bitcoin ATM? 
                    
			            - By Ginger  Hill
- Feb 18, 2014
 
            
                
	                 
                    
                                        
		            
                    “We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama
                    
			            - By Ginger  Hill
- Feb 13, 2014
 
            
                
	                 
                    
                                        
		            
                    “We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.
                    
			            - By Ginger  Hill
- Feb 12, 2014
 
            
                
	                
                    
                                        
		            
                    People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
                    
			            - By Andrew  Braunberg
- Feb 05, 2014
 
            
                
	                 
                    
                                        
		            
                    The five golden rules of developing a strong network security strategy for managing vendor access.
                    
			            - By Jeff   Swearingen 
- Feb 04, 2014
 
            
                
	                 
                    
                                        
		            
                    For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely. 
                    
			            - By Jeremy  Earles
- Feb 01, 2014