Quantcast

Latest Secure communication Stories

2014-05-21 04:22:01

Ross Perot Jr. and Cain Capital provide funding to further strengthen Silent Circle's market leadership and global delivery of unrivaled private communications services WASHINGTON and LONDON, May 21, 2014 /PRNewswire/ -- Silent Circle, the global private communications firm revolutionizing mobile device privacy, secure long-distance calling plans and secure smartphones for organizations and individuals alike, today announced it has raised $30 million in new investment capital in a...

2014-05-20 08:34:30

PORTLAND, Ore., May 20, 2014 /PRNewswire/ -- On April 22, 2014, the U.S. Patent and Trademark Office granted ID Experts U.S. Patent No. 8,707,445: Systems and Methods for Managing Data Incidents for RADAR, the industry leading incident management software. The patent covers RADAR's process of assessing security incidents of sensitive data under both federal and state data breach notification regulations and automatically generating an outcome of the assessment to the user's display...

2014-05-19 23:05:11

Leading ethical hacker Kevin Lam presents: "Hacking Into Your Healthcare Systems: Top Signs You're Prime for a Data Breach in 2014". This free webinar is provided by IronBox Secure File Transfer, a leading secure file transfer and data protection provider for healthcare, legal, accounting and financial professionals and OEM software developers. Redmond, WA (PRWEB) May 19, 2014 THE SPEAKER: Kevin Lam is a 15+ year expert in ethical hacking, secure application development and...

2014-05-15 08:41:03

Additional features include enhanced language support and a new set of Virtual Folder commands OMAHA, Neb., May 15, 2014 /PRNewswire/ -- Linoma Software is proud to announce the addition of SSO (Single Sign-On) support in its secure FTP server software, GoAnywhere Services(TM), with the release of version 3.5. The new feature is specifically designed to simplify the user experience without sacrificing security. Additional enhancements include two new languages, custom disclaimers for all...

2014-05-14 12:21:14

The vIPer VoIP phone modernizes and secures voice and data communications from the Top Secret-level and below for U.S. military and government agencies. SCOTTSDALE, Ariz., May 14, 2014 /PRNewswire/ -- General Dynamics C4 Systems has delivered the 4000(th) Sectera® vIPer(TM) Universal Secure Phone to the U.S. Department of State. Part of the General Dynamics cyber-defense product family, the vIPer secure phones are replacing outdated Secure Terminal Equipment (STE) phones currently...

2014-05-13 23:06:02

This year’s best of 2014 list for home security systems is now available at SecuritySystemReviews.com. Consumers can now save time and money while shopping for the right security system for their home. Memphis, Tennessee (PRWEB) May 13, 2014 Security System Reviews has released its reviews and recommendations for the leading security system companies for 2014. The following companies that made it on the list offer new and innovative products and technologies change the way homes are...

2014-05-08 12:21:14

With features professionals expect on a desktop phone, including caller ID, the vIPer phone can switch from unclassified to classified calls with a press of a button on the keypad SCOTTSDALE, Ariz., May 8, 2014 /PRNewswire/ -- The Sectera® vIPer(TM) Universal Secure Phone by General Dynamics C4 Systems has been selected by the Federal Bureau of Investigation (FBI) to replace outdated Secure Terminal Equipment (STE) phones. The vIPer Voice over Internet Protocol (VoIP) phone...

2014-05-05 12:32:28

On average, companies around the globe are spending $3.5 million to respond to a data breach TRAVERSE CITY, Mich., May 5, 2014 /PRNewswire/ -- Today Ponemon Institute released its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spanning 10 countries, the average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million[1]. The study also found that the cost incurred for each lost...

2014-05-02 12:25:49

CHICAGO, May 2, 2014 /PRNewswire/ -- Many businesses in a variety of industries, including private equity firms and their portfolio companies, can experience data security breaches. Violations often involve the loss of customers' personal and credit information, and many times, go far beyond the potential loss of financial information or regulatory penalties. The bad press from a security breach could equate to the loss of thousands, if not millions, of customers. In addition, the greater...

2014-04-29 08:43:36

CryptoAuditor Solution Updated to Deliver SSL/TLS Interception, Monitoring and DLP Integration for Greater Control and Visibility of Encrypted Channels HELSINKI and WALTHAM, Mass., April 29, 2014 /PRNewswire/ -- SSH Communications Security, known the world over as the inventor of the ubiquitous Secure Shell and SFTP protocols, today announced that its CryptoAuditor solution now supports SSL/TLS decryption, monitoring and DLP integration, representing encrypted channel monitoring support for...


Word of the Day
barratry
  • The offense of persistently instigating lawsuits, typically groundless ones.
  • An unlawful breach of duty on the part of a ship's master or crew resulting in injury to the ship's owner.
  • Sale or purchase of positions in church or state.
This word ultimately comes from the Old French word 'barater,' to cheat.
Related