Newsfeed Archive
News & Highlights
(Source: Odessa American) Waqar Ahmed, Chief Information Security Officer, Elixir Technologies … INDUSTRY KEYWORD: TECHNOLOGY DATA MANAGEMENT SOFTWARE SECURITY …
Read More
News & Highlights
(Source: PR Newswire (press release)) 13, 2018 /PRNewswire/ — NAPCO Security Technologies, Inc. (NasdaqGS … For additional information on NAPCO, please visit the Company’s web site at …
Read More
News & Highlights
(Source: EE Times) Can complex AI software be executed on mobile devices? …. potentially having control over hardware and the OS without providing a security risk as everything …
Read More
News & Highlights
(Source: Baseball Daily Digest) Trend Micro Incorporated develops and sells security solutions primarily in Japan. … endpoint security, email security, Web security, SaaS application security, …
Read More
News & Highlights
(Source: Database Trends and Applications) According to patchVantage, organizations are increasingly outsourcing security management to security service providers (SSPs) because the complexity, cost, …
Read More
News & Highlights
(Source: Fairfield Current) It provides Check Point Infinity Architecture, a cyber security architecture that … data, and applications; Check Point SandBlast Mobile for mobile security in iOS …
Read More
News & Highlights
(Source: Marea Informative (blog)) The company operates Cyren Cloud Security, a SaaS security platform, which provides Internet security services, including Web Security that provides the …
Read More
News & Highlights
(Source: News Anyway) The Eagle Eye Security Camera VMS has cyber-secure access from all iOS and Android mobile apps and from all major web browsers, including Internet …
Read More
News & Highlights
(Source: TweakTown (press release)) LONDON, Sept. 12, 2018 /PRNewswire/ — BlackBerry Limited (NYSE : BB ; TSX: BB) today announced new software and services as part of BlackBerry Spark, …
Read More
News & Highlights
(Source: EE Journal) The tRoot HSM includes both software– and hardware-accelerated cryptography options, as well as secure instruction and data memory controllers that provide …
Read More