Police say the fire was set by a contract employee and they do not consider it an act of terrorism. 
                    
			            - By Matt  Holden
 - Sep 26, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Over 200 restaurants were affected
                    
			            - By Matt  Holden
 - Sep 25, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.
                    
			            - By Ginger  Hill
 - Sep 24, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The company says it has made it impossible in order to deflect allegations of collecting user information.
                    
			            - By Matt  Holden
 - Sep 18, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    National Language Support means that the software can easily adapt to various languages without code changes. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Another hack in the long line of recent cyber-attacks, Home Depot’s issues showcase a bigger problem: the simplicity of the hack
                    
			            - By Matt  Holden
 - Sep 10, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Managed video sales training teaches technology's real-time capabilities, among other imporant concepts, to sales reps.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A test version of the government’s health insurance site was hacked.
                    
			            - By Matt  Holden
 - Sep 08, 2014
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Three things you can do to better protect the data on your cloud. 
                    
			            - By Ginger  Hill
 - Sep 08, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    LENSEC and Ingram Micro will roll out the new Perspective NVA at the Fall ONE Event.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    AW900F Industrial Wireless Ethernet delivers long range, reliable speed and secure wireless networking. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In 0.27 seconds, these were the top headlines that Google pulled from 67,500 results highlighting the latest data breaches around the globe.
                    
			            - By Ginger  Hill
 - Sep 01, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A little-known data collecting process by Google can be switched off.
                    
			            - By Matt  Holden
 - Aug 29, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Partnership enables RTTG to bring their Real-Time Verification (RTV) technology platform to state and federal customers. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    These actions will help put you back in control of your child's data.
                    
			            - By Ginger  Hill
 - Aug 28, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Non-educators want access to student data to apply principles of big data analysis to it. 
                    
			            - By Ginger  Hill
 - Aug 27, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Same malware used in Target attack also targeted more than a thousand other U.S. businesses.
                    
			            - By Ginger  Hill
 - Aug 22, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The shipping company found that 51 stores have been hacked
                    
			            - By Matt  Holden
 - Aug 22, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Companies called out for jeopardizing the security and privacy of their users.
                    
			            - By Ginger  Hill
 - Aug 20, 2014