Quantcast

Latest Data security Stories

2014-07-10 08:21:07

SAN JOSE, Calif., July 10, 2014 /PRNewswire/ -- Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, announced today that a case study on Con-way Inc. and its implementation of Vormetric Transparent Encryption is now available. The case study explores how Con-way is utilizing Vormetric's integrated encryption and key management for data-at-rest to protect customers' personally identifiable information (PII), proprietary data and intellectual property...

2014-07-08 23:13:04

tandem Social Media Management is designed to help financial institutions develop and maintain a social media management program that includes processes to develop a risk management program, manage social media posts, and monitor social media activity. Lubbock, TX (PRWEB) July 08, 2014 CoNetrix is pleased to announce the release of tandem Social Media Management, the newest module of the tandem Security and Compliance online software suite. tandem Social Media Management is designed to...

2014-07-08 23:01:09

Leading Australian law firm adopts Intapp Wall Builder. Brisbane, Australia and Palo Alto, CA (PRWEB) July 09, 2014 Intapp, provider of the most-adopted information access management and auditing software for law firms, today announced that McCullough Robertson, a leading Australian law firm, uses Intapp Wall Builder to secure client data across firm information repositories and support its risk management protocol. Law firms across the globe are updating their information security...

2014-07-08 08:24:26

Editor Note: For more information about this release, please scroll to bottom. NEW YORK, July 8, 2014 /PRNewswire/ -- Today, Analysts Review released its analysts' notes regarding Splunk Inc. (NASDAQ: SPLK), FireEye, Inc. (NASDAQ: FEYE), Intuit Inc. (NASDAQ: INTU), Red Hat, Inc. (NYSE: RHT) and SAP AG (NYSE: SAP). Private wealth members receive these notes ahead of publication. To reserve complementary membership, limited openings are available at:...

2014-07-01 12:33:16

A unique cybersecurity certification based on the Twenty Critical Security Controls BETHESDA, Md., July 1, 2014 /PRNewswire-USNewswire/ -- Global Information Assurance Certification (GIAC) is pleased to announce the GIAC Critical Controls Certification (GCCC), the only certification based on the Critical Security Controls, a prioritized, risk-based approach to security. The GCCC ensures that candidates have the knowledge and skills to implement and execute the Critical Security...

2014-07-01 12:32:50

FRISCO, Texas, July 1, 2014 /PRNewswire/ -- Encryptics, a provider of patented data privacy and protection services for businesses and government entities, has named John D. Cohen as the company's Chief Strategy Advisor. In this role, Cohen will be responsible for continuing to position its data encryption technology at the forefront of the cybersecurity landscape for private and public companies, governments, and public safety entities. "Data security is vital to both private and...

2014-06-30 08:34:28

ATLANTA, Georgia, June 30, 2014 /PRNewswire/ -- As data privacy requirements increase around the world, more organizations turn to Blancco's reporting solutions to avoid stringent penalties and ensure compliance with confidence Blancco [http://www.blancco.com ], the global leader in data erasure and computer reuse solutions, is helping more organizations than ever avoid costly penalties from data leaks. Using reporting...

2014-06-26 23:08:35

Co-Founder of TokenEx®, the Expanding Cloud-Based Data Tokenization Resource, Reveals the Hidden Costs of Hacks Tulsa, OK (PRWEB) June 26, 2014 According to the Ponemon Institute’s 2014 Cost of Data Breach Study, the average financial cost for each stolen record rose from $188 to $201, and the total average cost paid by an organization recovering from a breach rose from $5.4 to $5.9 million. “The hard cost, financial implications of a data breach can be astronomical for a...

2014-06-26 08:33:58

LUCCA, Italy, June 26, 2014 /PRNewswire/ -- Tagetik's Cloud Services are Certified Compliant With UNI CEI ISO/IEC 27001:2005 Information Security Management System Standard Tagetik, a global provider of enterprise software solutions for performance management, disclosure management, financial governance and business intelligence, today announced that it has receivedISO/IEC 27001 Certification. ISO/IEC 27001:2005, part of the growing ISO/IEC 27000 family of...

2014-06-25 12:36:10

DUBLIN, June 25, 2014 /PRNewswire/ -- Research and Markets (http://www.researchandmarkets.com/research/3nw2fg/security) has announced the addition of the "2014 Report on the International Security Information and Event Management Market by Solutions - Forecasts to 2019" report to their offering. http://photos.prnewswire.com/prnh/20130307/600769 Security Information and Event Management (SIEM) is the umbrella term that covers SIM (Security Information Management) and SEM (Security Event...


Word of the Day
virgule
  • A punctuation mark (/) used to separate related items of information.
  • A little rod; a twig.
This word comes from the Late Latin 'virgula,' accentual mark, a diminutive of 'virga,' rod.
Related