News & Highlights Archive
News & Highlights
(Source: Nasdaq) From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect …
Read More
News & Highlights
(Source: Android Community) Samsung Knox is made up of a platform, products, and solutions which gives your device built-in security, specifically in two aspects. It is buried within the device …
Read More
News & Highlights
(Source: PR Newswire) In this age of uncertainty and cyber-attacks and hacks, it pays to be ‘safe rather than sorry’. In the report ‘End-point Security Market: Global Industry Trend …
Read More
News & Highlights
(Source: HuffPost UK) Second, it reminded me of specific hacks demonstrated by security … in my last column comparing security and quality in the context of software; specifically, …
Read More
News & Highlights
(Source: ZDNet) After all, you cannot secure a vendor if you don’t know that they are a partner in … The right to audit a partner; Software maintenance and accountability from a …
Read More
News & Highlights
(Source: CSO Online) CEO Chuck Robbins highlighted security in his keynote and even chatted cybersec with Apple CEO, Tim Cook during his presentation. In fact, Apple and Cisco …
Read More
News & Highlights
(Source: Dark Reading) Mobile security software can do little to protect end users and BYOD workers when Signaling System 7 (SS7) vulnerabilities are exploited in mobile operotors’ …
Read More
News & Highlights
(Source: Benzinga) There are a number of clinical communication companies who have developed mobile applications which address the security concerns and can allow secure, …
Read More
News & Highlights
(Source: Marketwired) … 2017) – Purism, the social purpose corporation which designs and produces security focused hardware and software, has released a new report on the latest …
Read More
News & Highlights
(Source: ZDNet) Some 91 percent said they sought guidance from cybersecurity experts, but 75 percent did not have dedicated IT security budgets and planning processes, …
Read More