Quantcast

Latest Secure communication Stories

2014-05-24 23:01:49

Once again, a corporate behemoth found itself making headlines for all the wrong reasons this week when it came to light that eBay had been successfully hacked about a month ago and up to 145 million users had their personal information exposed in one of the largest data breaches in history. Joe Caruso, founder and CEO/CTO of Global Digital Forensics, sheds some light on how these mega breaches keep happening and discusses the costly fallout that can accompany data breaches of any...

2014-05-22 23:14:01

The next-generation threat investigation platform that combines endpoint security and analytics with automated response and remediation capabilities. Reston, VA (PRWEB) May 22, 2014 The Cloud Front Group today announced a strategic partnership with KEYW Holding Corporation and its subsidiary Hexis Cyber Solutions, Inc. (Hexis) to bring the next-generation threat investigation and removal solution, the HawkEye G, to Cloud Front Group’s portfolio of emerging technologies to aid the...

2014-05-21 04:22:01

Ross Perot Jr. and Cain Capital provide funding to further strengthen Silent Circle's market leadership and global delivery of unrivaled private communications services WASHINGTON and LONDON, May 21, 2014 /PRNewswire/ -- Silent Circle, the global private communications firm revolutionizing mobile device privacy, secure long-distance calling plans and secure smartphones for organizations and individuals alike, today announced it has raised $30 million in new investment capital in a...

2014-05-20 08:34:30

PORTLAND, Ore., May 20, 2014 /PRNewswire/ -- On April 22, 2014, the U.S. Patent and Trademark Office granted ID Experts U.S. Patent No. 8,707,445: Systems and Methods for Managing Data Incidents for RADAR, the industry leading incident management software. The patent covers RADAR's process of assessing security incidents of sensitive data under both federal and state data breach notification regulations and automatically generating an outcome of the assessment to the user's display...

2014-05-19 23:05:11

Leading ethical hacker Kevin Lam presents: "Hacking Into Your Healthcare Systems: Top Signs You're Prime for a Data Breach in 2014". This free webinar is provided by IronBox Secure File Transfer, a leading secure file transfer and data protection provider for healthcare, legal, accounting and financial professionals and OEM software developers. Redmond, WA (PRWEB) May 19, 2014 THE SPEAKER: Kevin Lam is a 15+ year expert in ethical hacking, secure application development and...

2014-05-15 08:41:03

Additional features include enhanced language support and a new set of Virtual Folder commands OMAHA, Neb., May 15, 2014 /PRNewswire/ -- Linoma Software is proud to announce the addition of SSO (Single Sign-On) support in its secure FTP server software, GoAnywhere Services(TM), with the release of version 3.5. The new feature is specifically designed to simplify the user experience without sacrificing security. Additional enhancements include two new languages, custom disclaimers for all...

2014-05-14 12:21:14

The vIPer VoIP phone modernizes and secures voice and data communications from the Top Secret-level and below for U.S. military and government agencies. SCOTTSDALE, Ariz., May 14, 2014 /PRNewswire/ -- General Dynamics C4 Systems has delivered the 4000(th) Sectera® vIPer(TM) Universal Secure Phone to the U.S. Department of State. Part of the General Dynamics cyber-defense product family, the vIPer secure phones are replacing outdated Secure Terminal Equipment (STE) phones currently...

2014-05-13 23:06:02

This year’s best of 2014 list for home security systems is now available at SecuritySystemReviews.com. Consumers can now save time and money while shopping for the right security system for their home. Memphis, Tennessee (PRWEB) May 13, 2014 Security System Reviews has released its reviews and recommendations for the leading security system companies for 2014. The following companies that made it on the list offer new and innovative products and technologies change the way homes are...

2014-05-08 12:21:14

With features professionals expect on a desktop phone, including caller ID, the vIPer phone can switch from unclassified to classified calls with a press of a button on the keypad SCOTTSDALE, Ariz., May 8, 2014 /PRNewswire/ -- The Sectera® vIPer(TM) Universal Secure Phone by General Dynamics C4 Systems has been selected by the Federal Bureau of Investigation (FBI) to replace outdated Secure Terminal Equipment (STE) phones. The vIPer Voice over Internet Protocol (VoIP) phone...

2014-05-05 12:32:28

On average, companies around the globe are spending $3.5 million to respond to a data breach TRAVERSE CITY, Mich., May 5, 2014 /PRNewswire/ -- Today Ponemon Institute released its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spanning 10 countries, the average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million[1]. The study also found that the cost incurred for each lost...


Word of the Day
penuche
  • A fudgelike confection of brown sugar, cream or milk, and chopped nuts.
'Penuche' is a variant of 'panocha,' a coarse grade of sugar made in Mexico. 'Panocha' probably comes from the Spanish 'panoja, panocha,' ear of grain.
Related