Compliance
  Governance
  Risk-Management
  Security
News

< Back
Security : Department of Homeland Security : Policy Management :  
Project Management Institute Testifies on Program Management for Homeland Security
Project Management Institute (PMI) testified last week before the United States House of Representatives Committee on Homeland Security, Subcommittee on Oversight and Management Efficiency.
Craig Killough
Vice President of Organization Markets
Project Management Institute

read more >

Security : Antivirus
> Peace of Mind and Seamless Sync for All
Security : Authentication
> Extending Anomaly Detection
> Secure, Convenient and Scalable Mobile Authentication
> Don't Use Passwords
> Sophisticated Cyber Attacks Continue
> Philip Lieberman Calls Retail CEOs Incompetent
> POS Are Inherently Weak
> How to Mitigate Against POS Malware
> Yet Another Card Payment Data Breach
> New Insight, Intelligence and Control for Unstructured Data
> Inherent Flaw in Security Audits
  More Authentication...
Security : Cloud
> Top 25 US Bank Selects Easy Solutions for Fraud Protection
> Improving Global Email Health
> Epidemic of Security Breaches
> Software-Defined Encryption Key Management
> Apple’s Incompetence in Security Operations
> The Home Depot Hack
> Securing Applications as the World Goes Digital
> Authenticating and Securing Mobile Commerce
> Promisec Offers Easy Identification for Microsoft Patch MS14-045
> Next Generation Email Security
  More Cloud...
Security : Configuration Management
> Comprehensive Privileged Identity Management
> Xceedium Xsuite Now Certified as VCE Vblock Ready
> Ocean Park Selects Xceedium to Protect Enterprise IT Infrastructure
> The Year of Endpoints
> Promisec Wins SIIA Software CODiE Award
Security : Continuous Monitoring
> 80% of IT Security Professionals Are Delusional
> Survey Finds Private Cloud is Holding Feds Back
> Tripwire Adds Security Analytics Focus
> Cyber Security’s Continuous Diagnostics and Mitigation Report
> Continuous Monitoring of Database Networks is Key
Security : Control Framework
> Improve Takedown Times Leveraging DMARC
> Home Depot Breach
> Total Fraud Protection Platform
> Network Segmentation Management Fortifies Security
> Breakthrough Data Center Access and Control
> Benefits of Data Integrity Controls for Effective Data Management
> Unisys ClearPath MCP Software Expands Capabilities for Mission-Critical Applications
> Data Quality and Compliance Efforts
> Infogix ER: The Next-Generation Reconciliation Solution
Security : Cyber Attacks
> Cybersecurity Initiative for Manufacturers
> Business Continuity Management Key to Handling Crisis
> Malware Compromising Networks of over 1,000 US Businesses
> Next Generation of Cybercrime Threatens to Damage Markets and Economies
> Impact of Target Data Breach on Cybersecurity Budget
> Protect Against Government Malware
> PCI Compliance Contributes To False Sense of Security
> Addressing the Security Skills Shortage
> Tripwire Overtakes Symantec in Key Metric
> Cybersecurity: What Every Board Must Know
  More Cyber Attacks...
Security : Cyber Liability Insurance
> As Cyber Security Threats Surge Hedge Funds Turn to Cyber Liability Insurance
Security : Cyber Policy
> PwC and IRRC Institute Release New Cybersecurity Report
> Agiliance Shortlisted for Three 2014 Golden Bridge Awards
> Compliance with New SEC Cybersecurity Regulations
> Threat Centered Operational Risk Management
> Real-Time Risk Remediation
> RiskVision Earns The Gold in the 2014
> Continuous Management of Cyber Security Risks
> Threat Intelligence
> root9B Enlists Key Advisors to Help Build its Growing Cybersecurity Business
Security : Data Breach
> Complexity of Today’s Cyber Attacks Leaves Many Organizations Exposed
> Apple Validates Data Centric Security Model
> CryptoLocker Ransomware Spread Through YouTube
> Data Access Governance Controls
> What Kind of Person Robs Goodwill?
> Say It Isn't So Goodwill Get Hacked
> Employee PC Wreaks Havoc in JP Morgan Hack
> Instant Microsoft Patch Validation
> Card Issuers Can Address Consumers’ Concerns
> Second Generation Ransomware In The Wild
  More Data Breach...
Security : Data Management
> HOB Highlights Technology Partnership with F5
> Flexible Secure Remote Access
> Protect Data in the Cloud
> MegaPath Recognized for Exceptional Innovation
> Data Privacy Program for IT and Security Professionals
> New Interoperable Data Gateway from Mutualink Connects Soldiers with Disparate Tactical Networks and C2
> Optimize the Quality of Exchanges Between Applications
> New Privacy Impact Assessment Solution
> 3 Must Haves for Successful Data Backup
> PwC US Named to 2013 Online Trust Honor Roll
  More Data Management...
Security : Department of Homeland Security
> Use of Anti-Terrorism Technology Urged at Public Events
Security : Document Management
> Mortgage e-Signatures Just Got Better
Security : Email/Messaging
> DCP Selects Zix Email Encryption to Replace Cisco
> AppRiver Releases Mid-Year Global Security Report
> AppRiver Comes to Barcelona
> ZixOne on the Samsung Solutions Exchange
> Digital Disaster Program Encourages Businesses to Get Prepared
> Office 365 Risk Management Capabilities
> StrikeForce Technologies is Awarded a Second Patent for its Keystroke Encryption Technology
> Mimecast for Office 365 Add Critical Security
> Zix Encryption Network Protects Every Email between Its Members
> Keeping Sensitive Information Secure
  More Email/Messaging...
Security : Embedded
> Encrypted Media Extension Implementation
> Enforce Content Licensing Rights and Protect Subscriber Revenues
> Protecting Embedded Systems
> Remy de Tonnac Named Finalist for 2014 Golden Bridge Award
> A New Single-Wire-Protocol License Agreement for INSIDE Secure
> INSIDE Secure Protects Live Streaming Service ‘BBTV NEXT’ for TV Bank in Japan
> Advanced DRM Technology for Protection for Intel-Based Mobile Devices
> Advanced Dual Interface Secure Microcontroller for E-Government Applications
> INSIDE Secure Protects Premium Content for Snap
> INSIDE Secure and SELINKO Revolutionize Wine and Spirits Anti-Counterfeiting
Security : Enterprise Security Manager
> McAfee Earns DOD's Approved Products List
Security : Forensics
> The Evolution of XRY Digital Forensics Technology
> Latest Evolution of Internationally Recognized Digital Forensics
Security : Fraud
> Accuvant Discloses Cellular Phone Software Vulnerabilities
> Check Fraud Solution with Cross Channel Analytics for Effective Detection
> Check Fraud Solution with Cross Channel Analytics Launched
> Florida is 1 for Per Capita ID Theft and Fraud Complaints
> Layered Fraud Intelligence
> 12 Million Fraud Victims Reported in 2012
> $20B Mobile Payments Market is Attractive Fraud Target
> ’Tis the Season — For Fraud
Security : Identity Theft
> Desire for Increased Security by Mobile and Web Users
> Identity Theft Training 10,000 Law Enforcement Agents
Security : Internet of Things
> How U.S. Public Agencies Can Extend Internet of Things Benefits to ‘Save Lives’
> Enterprise-Grade IoT Security
Security : Malware
> Tenable Network Security Adds Support for AirWatch Platform
> Mobile Device Assessment
> Comprehensive Protection for The Hybrid Data Center
> Success of Phishing Attacks
> New Ransomware Strain Causes Data Breaches
> Scan the AWS Cloud for Potential Vulnerabilities
> IQRisk Query Delivers Comprehensive Intelligence Data
> Cyber-Ransom Likely to Become the New Norm
> Concern Over Ransomware Skyrocketing
> Tenable Network Security Named a Top Workplace by The Washington Post
  More Malware...
Security : Mobile
> Unauthorized Access to Facebook Accounts
Security : Online Fraud
> SSL Certificates Included in Tucows OpenSRS Platform
> Innovative Weapon Against Financial Cybercrime
> New FFIEC Guidelines Likely to Address Root Causes of Online Bank Fraud
Security : Password
> Accounts Open to Attack
> Password Safe Integration
Security : Patches
> NOVELL Vulnerability Discovered
Security : Patent
> Account Protection Beyond the Physical Check
> Check Fraud Protection Patent Issued
Security : Policy Management
> WatchGuard Partner Program Emphasizes Profitability
> SHARE in Pittsburgh For All Career Levels
> Swivel Secure Expands in Central and Eastern Europe
> ISACA Issues 25,000th CISM Certification
> Critical Enabling Technology
> Tufin Launches Generation T-Series Appliances
> Tufin Recognized for Leadership, Innovation and Business Expansion
> Tufin Primed for Market Growth
Security : SIEM
> Integrate Security Data with Crowd Sourced Threat Intelligence
> Digital Theft Detection
> ManageEngine Fortifies EventLog Analyzer
> One Hour SIEM
Security : Signal Detection
> CACI Awarded $22 Million Prime Contract
> New Signal Detection Solution for Law Enforcement Professionals
Security : Storage
> Miami Marlins Select Cleversafe to Create Secure, Reliable Environment for Critical Team Data
Security : Surveillance
> Coping with Evolving Crime and Threat Patterns
> ISACA Chapters Awarded for Outstanding Contributions to the IT Profession
> Comprehensive Cybersecurity Nexus Program
> Introducing Multi-language Surveillance Support
> New Player to Target Defence and Security Markets
Security : Tablets
> File Encryption Comes To Windows 8.1 Tablets
Security : Technology
> ISACA Launches COBIT 5 Online
> Ping Identity Named Leader in Identity Access Management
> Vulnerability Management for IT GRC Programs
> NIST Releases Draft Guidelines for Secure Shell Access Controls for Public Comment
> How to Implement the US Cybersecurity Framework
> Phishing Tops List of Concerns
> ISACA’s Free Virtual Conference Addresses Mobile Security
> JSSEC Releases English Version of Android Application Guidebook
> z/OS is z/Protect-ed
> LogRhythm Introduces Honeypot Security Analytics Suite
  More Technology...
Security : Thought Leader
> Banks Need Better Protection
> Organizations Become More Threat-Aware
> Ponemon Institute Releases Study on Security Risk Technology
> Challenging Today’s Approach to IT Security
> Senator Rockefeller Recognized for Cyber Security Leadership
Security : Unstructured Data
> Securing Unstructured Data
Security : eForensics
> Biometric Touch Panel
> Dr. Parag Pruthi Invited to AT&T Cyber Security Conference
> Secure Sanitization of Hard Drives


About Us Editorial

© 2019 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY