Latest Secure communication Stories
Once again, a corporate behemoth found itself making headlines for all the wrong reasons this week when it came to light that eBay had been successfully hacked about a month ago and up to 145
The next-generation threat investigation platform that combines endpoint security and analytics with automated response and remediation capabilities. Reston,
Ross Perot Jr.
PORTLAND, Ore., May 20, 2014 /PRNewswire/ -- On April 22, 2014, the U.S. Patent and Trademark Office granted ID Experts U.S. Patent No.
Leading ethical hacker Kevin Lam presents: "Hacking Into Your Healthcare Systems: Top Signs You're Prime for a Data Breach in 2014".
Additional features include enhanced language support and a new set of Virtual Folder commands OMAHA, Neb., May 15, 2014 /PRNewswire/ -- Linoma Software is proud to announce the addition of
The vIPer VoIP phone modernizes and secures voice and data communications from the Top Secret-level and below for U.S.
This year’s best of 2014 list for home security systems is now available at SecuritySystemReviews.com.
With features professionals expect on a desktop phone, including caller ID, the vIPer phone can switch from unclassified to classified calls with a press of a button on the keypad SCOTTSDALE,
On average, companies around the globe are spending $3.5 million to respond to a data breach TRAVERSE CITY, Mich., May 5, 2014 /PRNewswire/ -- Today Ponemon Institute released its ninth annual