"We are extremely proud of Leo and the incredible amount of time and effort he provides in support of our service men and women. His devotion to helping them transition from military life to professional civilian careers exemplifies our recognition of American freedoms and opportunities," said Daniel Krantz, CEO of Real-Time Technology Group.
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
Protect your digital life with this checklist of must-do security tasks.
- By Ginger Hill
- Apr 17, 2014
A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.
- By Ginger Hill
- Apr 16, 2014
Unique, event-based video discover platform coming to ISC West 2014.
Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
- By Ginger Hill
- Mar 06, 2014
Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.
- By Ginger Hill
- Mar 04, 2014
Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.
Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
- By Ginger Hill
- Feb 24, 2014
New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.
Is your city one of the first in America to host a Bitcoin ATM?
- By Ginger Hill
- Feb 18, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama
- By Ginger Hill
- Feb 13, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.
- By Ginger Hill
- Feb 12, 2014
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.
- By Jeremy Earles
- Feb 01, 2014
The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
A strategy for the successful management of vendor remote access.
- By Ginger Hill
- Jan 30, 2014
What to do if your statement has a charge of $9.84 followed by an unfamiliar website URL.
- By Ginger Hill
- Jan 28, 2014