Traditional approaches to information security are no longer adequate to protect information networks from modern threats Dimension Data offering to help organisations assess the maturity...
The training material is created as a standardized curriculum to train police officers in a five day program Data Security Council of India (DSCI) releases...
Says Dell Data Protection | Endpoint Security Suite delivers encryption, authentication and threat protection in a single solution Dell has launched a new endpoint security...
The first safe city project in India to use advanced face recognition technology NEC India and NEC Corporation, together with Innovative Telecom & Softwares Pvt....
McAfee Report finds 18 of 25 Top Mobile Apps Reported Vulnerable in September 2014 Remain Unpatched According to Intel Security released its McAfee Labs Threats...
Expands Line of Ultra-Rugged IronTag RFID Transponders with New Extensive Memory UHF Solution HID Global’s Identification Technologies division has launched its IronTag206 RFID transponders that...
Unique Insight into Global Threats Means Better Protections for Customers Arbor Networks ATLAS threat monitoring infrastructure, which was launched eight years ago this month, is...
The group is Attacking Thousands of Victims Globally Kaspersky Lab’s Global Research and Analysis Team has discovered Desert Falcons – a cyber-espionage group targeting multiple...
iSTAR Edge and iSTAR Ultra door controllers have been certified under the government’s FIPS 140-2 program Software House, part of the Security Products business unit...
Offers a hybrid model integrating automatic scanning efficiencies together with manual testing Happiest Minds launched its upgraded version of Cloud based penetration testing, ThreatVigil, which...