Personalized approach to selling home security is effective in connecting with customers and prospects. LifeShield Security authorized dealers throughout the country can now connect with consumers on a regional level through locally ...
Tags: Web Presence, Authorized Dealers, Computer Products, LifeShield
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security
Computer vulnerabilities and how they can affect Americans' security are on the agenda for the U.S. Senate, and strong rhetoric is being used to support new legislation. The Cybersecurity Act of 2012 is expected to move to the Senate ...
Tags: Rhetoric, Cybersecurity Bill, Washington, Computer Vulnerabilities
F5 and Webroot have announced a partnership to tie-up their networking and security offerings to protect enterprise applications from external threats. The deal will see F5 incorporate Webroot's IP Reputation Services into its Traffic ...
Tags: F5, Webroot, networking, security offerings
Viseum's intelligent CCTV system can be implemented by Police and law enforcement agencies, to aid the monstrous security challenges set by public events, like the Olympic Games and the Jubilee Celebrations. Whilst it can help London 2012 ...
Tags: Viseum, law enforcement, security bill, software
Global ICT leaders will gather to discuss topics including the ‘radical transformation of the ICT industry’ at this year’s ITU Telecom World 2012, opening in Dubai next month. The event is staged for 14-18 October, and ...
Tags: Dubai, Global Leaders, ITU Telecom World, ICT
RSA,the security arm of storage corporation EMC,today claimed that not one of its customers has been the victim of a successful cyber attack in the past 19 months. Speaking at RSA Conference Europe 2012,RSA president Tom Heiser said that ...
Global revenue for platform as a service(PaaS)will grow consistently for five years from 2012 to reach$2.9bn in 2016,up from$900m in 2011,according to research firm Gartner. But as the platform-as-a-service delivery model grows,it will ...
Existing enterprise mobile device management [MDM] solutions come with "really serious constraints," Westminster Council CIO Ben Goward has told Computing. Speaking at Aditi Technologies' GoCloud 8 conference in London today, Goward said ...
Tags: Ben Goward, MDM, BYOD, Outlook intregration
Cloud computing is an opportunity information security professionals should not miss,according to Philippe Courtot,chairman and CEO of security company Qualys. "This is a fantastic and opportunity to sit down with the CIO and the ...
Tags: Cloud computing, Information security, Qualys, London
Veracode's Chris Eng tackles cloud security propositions,per device versus across the board BYOD solutions,and the rise of cyber attacks on SMBs. Further reading Managing mobile devices–The BYOD challenge Sheffield CIO is right to ...
Tags: cyber attacks, security challenges, BYOD
Many companies are not taking into account modern technology and methods when approaching data security, said Cisco senior vice president of security and government, Chris Young, at a press roundtable in London today. Young labelled the ...
Tags: Chris Young, Cisco, Huawei, ZTE
The government is to spend GBP2m a year on a cyber-security centre. The centre will act as an international forum to draw together private sector,governments and international organisations,said the Foreign and Commonwealth Office in a ...
Tags: Government, cyber security centre, foreign secretary, William Hague
Table of contents Public Wi-Fi hotspot dangers Security of 3G and 4G-based hotspots Network access requires careful management Educating users about security risks Network security controls and practices are among the most mature,but can ...
Tags: Public Wi-Fi hotspot, 3G and 4G-based hotspots, security risks