Your are here:hacking technology > encryption decipher > Article list

Unauthorised access via mobile phones set to riseHits:1
According to Goode Intelligence, 89 percent of security professionals in its 2009 survey Mobile Security Survey estimate that the current level of awareness for the safety of mobile phone doesis not enough. In addition, 46 percent of...2011-01-12
Trends in IT security purchasing decisions in 2010Hits:1
The recession is likelybe an important factor in the decisions ofIT Security buying theNext year, with companies looking for solutions that will reduce co?ts in progress and provide rapid ROI. 1. XTMs users will migrate from 'UTM...2011-01-11
Check Point announces Windows 7 support for Endpoint Security and launches Windows 7 version of ZoneHits:1
Companies with mixed Windows OS get immediate protection against the latest threats with a wide endpoint security solution Check Point Software Technologies Ltd. announced Microsoft Windows 7 support...2011-01-10
UniKey Protects Software from Reverse EngineeringHits:3
SoftwareReverse engineering is the technique ofobtaining the source code fororigin from the binary. Competitors may use thereverse engineering to understand how you made this cool feature. Crackers could theuse to see how they can work...2011-01-08
Egress Switch protects and controls sensitive information shared outside the NHS City and Hackney boHits:1
City and Hackney NHS often share confidential information with a wide range of community services to provide high quality care. Having established a secure FTP and encryption traditional file share information securely, these...2011-01-07
Thousands of Mobile Devices left at airportsHits:1
According to telephone interviews with lost property offices at airports in the United Kingdom 15, including Heathrow and Luton airports, thousands of mobile phones and laptops have been left theLast year, with the majority still...2011-01-07
Half of UK public and private sector organisations are at risk of data breaches and losses from portHits:1
A survey of 130 of Check Point IT managers in the United Kingdom and personnel officers revealed that over half the UK public sector organizations and private sectors are at risk of data breaches, losses and leakage from 'laptops and...2011-01-05
Cipurse open security standard brings higher performance and advanced system security for public traHits:2
The open standard for Public Transport (TMB) Alliance has implemented a security standard to promote open the next generation of more s?r, transportation systems cost effective, scalable and extensible collection. Now open to new members...2011-01-04
Majority of people share their USBs with family, colleagues or friendsHits:1
Conducted by CREDANT Technologies, a new survey has revealed that ownership of the USB flash drive exploded with 100% of the 229 respondents with at least one such device - 54% have between 3 and 6 - and more than 21%...2010-12-31
IT administrators are increasingly challenged with securing mobile dataHits:1
As companies continue to cro?be in size, IT administrators are increasingly challenged to secure mobile data and complex computing environments - citing the loss of data, user management, loss or theft of equipment, and staff login...2010-12-30
DeviceLock and SecurStar partner to offer a centrally managed endpoint security solutionHits:1
DeviceLock, Inc and SecurStar jointly announced the general availability ofan integrated endpoint security managed centrally to the challenge ofstop unauthorized transfers of data from desktop computers toCompany, and laptops...2010-12-29
Security doubts overshadow cloud computingHits:1
The Payment Card Industry Data Security Standard (PCI DSS) and the U.S. Health Information Portability and Accountability Act (HIPAA) is driving projects encryption between industries according to the findings of the new 2009...2010-12-29
CIOs must be on the increase of Zeitarbeitskr?ften and consultants by recession worryHits:1
In June this to?or CBI predicted that we will be stuck for at least another 12 months in a recession. The dangers of the current financial situation on the morale of the staff are clear - no one likes the feeling as...2010-12-27
Origin Storage Portable launches 1 TB drive encryption hardwareHits:1
According to KPMG-Barometer data loss, 11% of data loss through theft of portable device?th, and 14% of the theft or loss of copies. With stories of data loss, which often has in the headlines, the need to protect data has become necessary...2010-12-25
The Proofpoint Enterprise Protection Suite protects your email infrastructure against external threaHits:4
Proofpoint, Inc. has released version 6.2 of the e-mail security and compliance Proofpoint platform of the company, Including?Lich of the new features of the Proofpoint Protection company?Privacy and Proofpoint company?re?Suites. New...2010-12-24

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:4 , Total 33 Pages, Every Page 15 Records, Total Records: 491

Hot Articles
Recommend Articles
New Articles
Sub category