Your are here:hacking technology > invades the examination > Article list

Comodo Two Factor Authentication Solution helps Boiling Springs Savings Bank to meet 2006 FFIEC guidHits:2
Financial institutions are under pressure to comply with Federal Financial Institutions Examination Council (FFIEC) guidelines by year-end to evaluate and strengthen their mutual authentication processes for online banking transactions. To...2009-02-20
T3i teams with Passfaces to offer strong online authenticationHits:1
Identity and data theft is rampant. In an effort to address it, the Federal Financial Institutions Examination Council (FFIEC) issued guidance to US financial institutions. The guidance recommends that financial institutions that operate...2009-02-20
Train 4 Security wins Royal Gurkha Rifles training contractHits:3
Train 4 Security has won a contract with The Royal Gurkha Rifles and will deliver the initial four day training programme at the Regiment's Folkestone headquarters. The course, which will result in a Security Industry Authority license for...2009-02-16
Will Financial Institutions Really be More Secure with 2-Factor Authentication?Hits:1
In October of 2005, the Federal Financial Institutions Examination Council issued a recommendation urging financial institutions to implement stronger (two factor) authentication before the end of 2006. Two-factor authentication is the...2009-02-16
Biometric fingerprint entry access system protects children from harm at Lucker Nature KindergartenHits:3
Located in the sleepy coastal hamlet of Lucker in the original old village school, Lucker Nature Kindergarten provides child care for fifteen children between the ages of twelve months and five years. In addition to a secure,...2009-02-13
Part Of The Security Industry Fails To Meet Licensing DeadlineHits:3
There is likely to be a shortage of licensed security guards after the March 20th 2006 licensing deadline. After 20th March 2006 anyone operating without a licence will be committing a criminal offence. Many security companies have not yet...2009-02-13
Special report: Fleet card securityHits:2
There is a strong positive correlation between fleet size and the importance of vehicle-specific analysis, while card insurance is the only security service to be more valued by the smaller fleet operators. However, Personal Identification...2009-02-13
New High Tech Sensing Device from Technest Holdings for Chemical Plant Security to Protect Against THits:3
Technest Holdings, Inc. has announced that its wholly owned subsidiary, EOIR Technologies Inc., has developed a new remote sensing device named the Automated Adaptive Chemical Examination System (AACES). The AACES is expected to be able to...2009-02-13
Armor Holdings Acquires Swiss-Photonics Forensics Optical Equipment CompanyHits:3
Armor Holdings, Inc. has announced the acquisition of 100% of the stock of Swiss-Photonics AG. Swiss-Photonics, through its trade name, Projectina, manufactures, markets and distributes highly specialized document examination equipment...2009-02-12
Search engine users are at risk of clicking through to Web sites that can compromise their online saHits:2
McAfee, Inc. has released a study co-authored by Ben Edelman on the safety of the Internet search engines. This new study shows search engine users are at risk of clicking through to Web sites that can compromise their online safety. The...2009-02-12
Brandimensions Provides Anti-Phishing Solution with Comprehensive Identity Theft ManagementHits:3
In order to effectively fight identity theft, banks need to demonstrate to the FFIEC as well as to consumers that online banking systems are secure and confidential. In order to do this, financial organizations require solutions that...2009-02-12
McAfee and WireworX to provide managed security services to UK micro-businessesHits:2
McAfee, Inc.has announced a partnership tie-up with WireworX to add managed security services to WireworX's IT services offering for UK micro-businesses (companies with 1-10 employees). Protection against viruses, hackers, spyware and spam...2009-02-12
Network security management three big principlesHits:3
Below the enterprise network safety control, provides completes the information access jurisdiction which for the staff its labor of duty needs, to avoid the person without authorization changing company's essential documents, the balanced...2009-01-20
Overseas five model of outstanding firewall software simple introduction (chart)Hits:4
Overseas five model of outstanding firewall software simple introduction (chart)What the firewall refers to is one becomes, the protection barrier which by the software and the hardware equipment combination between the intranet and the exterior net, the private network and on the...2009-01-20
Brandimensions Provides Anti-Phishing Solution with Comprehensive Identity Theft ManagementHits:2
In order to effectively fight identity theft, banks need to demonstrate to the FFIEC as well as to consumers that online banking systems are secure and confidential. In order to do this, financial organizations require solutions that...2009-01-19

Home  <<Prev  3   4   5   6   7   8   9   10   11   12   13  Next>>  Last

Current Page:8 , Total 20 Pages, Every Page 15 Records, Total Records: 291

Hot Articles
Recommend Articles
New Articles
Sub category