Modern Listing Example
Social engineering: Mitigating a stealthy risk
By Jos Maas Can an organisation get victimised by social engineering? And if so, what…
Security beyond 2014 – brace for challenges
By Prince Lazar Professional in-house security personnel work diligently to achieve robust and leading-edge security…
HID Global acquires biometric leader Lumidigm
HID Global®, a worldwide leader in secure identity solutions, has announced the acquisition of Lumidigm®,…
Imperva acquires Tomium Software Assets to accelerate mainframe data security solutions
Imperva Inc, pioneering the third pillar of enterprise security with a new layer of protection…
Raytec strikes gold with AXIS in Northern Europe
Raytec is delighted to announce they have been chosen as the first ever AXIS Gold…
New Zealand’s financial markets authority deploys Good Technology to mobilise business processes
Good Technology ™, the leader in secure mobility, has announced that New Zealand’s financial conduct…
Mobile Valentine apps send love, take sensitive data
The pink hearts and cuddly bears so ubiquitous to Valentine’s Day may be hiding invasive…
Morse Watchmans announces key control and asset management systems best practices whitepaper
Morse Watchmans, the leading supplier of key control and management systems, has published a whitepaper…