Click to Share
 
 
  1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution

cybersecurity Press Releases

  + XML/RSS  



By ICS-ISAC
During the April 17th Industrial Control System Information Sharing & Analysis Center (ICS-ISAC) Public Briefing Dave Teumim, President of Teumim Technical, LLC will provide a high-level brief on ICS Security in Rail Transit Control &...

By Schweitzer Engineering Laboratories, Inc.
The 2013 SEL Modern Solutions Power Systems Conference (MSPSC) keynote speakers are SEL founder Dr. Edmund Schweitzer, author Michael Schellenberger, reliability expert Dr. Marvin Roush. The MSPSC takes place June 5–7, 2013, in Chicago, Illinois.

By Assoc of Certified Financial Crime Specialists
In just two months, D&B and Ernst & Young will join forces with the Association of Certified Financial Crime Specialists as Presenting Sponsors of the 2013 International Financial Crime Conference on May 16-18 at the Westin Diplomat Hotel in...

By ICS-ISAC
During the March 20th ICS-ISAC Member Briefing Ray Potter, CEO of SafeLogic, will provide a first-hand assessment of the challenges and opportunities associated with the application of cryptography to industrial control systems.

By SBA * Consulting LTD
Today, cyber intrusion leading to crime is a real threat for all types of businesses. As recent statistics from the “2012 Norton Cybercrime Report” show there are 556 Million victims of cybercrime annually.

By commissum
The information security firm commissum has again sponsored a prize for the best student on the Open University course “Information Security Management”. The prize takes the form of a book token, and is awarded annually.

By CRC Press
If a network is not secure, how valuable is it? This book takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks.

By ICS-ISAC
The February 20th ICS-ISAC Briefing features Miki Calero, Chief Security Officer for the City of Columbus Ohio, providing a first-hand assessment of challenges and opportunities presented to those responsible for securing municipal infrastructures.

By ISSA-LA
Former cybersecurity coordinator of the Obama Administration, Howard A. Schmidt, will be a keynote speaker at the Los Angeles Chapter of the Information Systems Security Association Fifth Annual Information Security Summit on May 21, 2013.

By Wave Systems Corp.
Wave Systems Corp., the Trusted Computing Company, announced an expansion of its distribution channel, highlighted by strategic agreements with Infodat Technologies in India; TechSearch Corp. in Korea; and Bangkok Systems & Software in Thailand.

By ICS-ISAC
Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) Chair Chris Blask to present "Building Common Defenses Through Knowledge Sharing" at Secure Energy 2013 in Doha, Qatar.

By commissum
A photographer’s zoom lens caused an embarrassing data leak, stemming from a photograph of an advisor carrying a sensitive document in plain view. Information security company commissum comments on the implications for national cyber-security.

By www.cyberdefcon.com
CyberDefcon, an independent organization focusing on security research and services, announces the release of a white paper welcoming the new gTLD program as an important step in improved cyber security ‘by design’.

By Dynetics
Cybersecurity expert will present paper at international conference

By ISSA-LA
The LA Chapter of the Information Systems Security Association is encouraging individuals and businesses in Los Angeles to learn how to better protect themselves from cybercrime during National Cyber Security Awareness Month.

By EnergySec
Richard Clarke, Seán Paul McGurk and Honorable Patricia Hoffman featured at Portland security conference

By commissum
commissum, a specialist information security company based in Edinburgh, salutes "Control-Alt-Hack", a new initiative in cybersecurity awareness-raising and education.

By CRC Press
It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.

By Sourcefire
Leadership Position Secured Based on Completeness of Vision and Ability to Execute

By Silver Tail Systems
Panel to Illustrate Today’s Enterprise Threats Resulting from a Surge in Mobile Platforms

By Silver Tail Systems
Recent Attacks Verify Need for Visibility into Web Sessions and Highlight Importance of Behavioral Analysis

By Smart Grid Today
Based on exclusive interviews with electric utility experts at the heart of the cybersecurity industry, “CYBER inSECURITY” debunks many myths and offers tangible options for utilities working to achieve safe and reliable delivery of the energy.

By SECNAP Network Security
The CloudJacket Security solution has been honored for its innovative technology by the 2012 Network Products Guide. CloudJacket represents a game changer in the cloud security market and a disruptive shift from traditional security products.

By Visiongain
Visiongain’s analysis indicates that the global infrastructure security market, in terms of government spending, will reach a value of $32.55bn in 2012.

By Varonis Systems Inc.
On May 15 take a deep dive into Big Data to learn how to maximize value and minimize risk to the biggest reservoir of information organizations have - unstructured and semi structured data

By Daniel J. Cohen
Leading Ad Publication Trains All Corporate Employees to Defend Digital Data

By Dr Daniel Bilar
Siege Technologies wins five-year contract to provide cutting edge offensive/defensive Windows kernel security training material to advanced DoD operators

By Mike Kilroy
National Cybersecurity Education Program Earns Plaudits for Preparing College Students to Meet Critical Workforce Needs

By PR Artistry
CESG, the UK Government’s National Technical Authority for Information Assurance, and Becrypt, a leading data security provider, are pleased to announce the first product to be certified under CESG’s Commercial Product Assurance scheme.

By PR Artistry
High profile Platinum Partner enhances professional services offering on Becrypt’s End-point Encryption range

By NH-ISAC
The National Health Information Sharing & Analysis Center, announced a teaming agreement with iNetwork, to provide the West Coast with security facilities and technologies to support critical infrastructure protection for the healthcare sector.

By UKFast
'Fun' social apps are leaving a gaping hole in oblivious users' online security.

By PR Artistry
Council implements Becrypt Trusted Client to enable secure remote access to network and facilitate cost reduction strategy

By GICSR
The Global Institute for Cybersecurity and Research (GICSR) announces the launch of its cybersecurity based workforce education initiative -- a nationally coordinated public/private collaboration with the NIST.

By Varonis Systems Inc.
The new Varonis guide, Preventing Data Leaks with Automated Data Governance, outlines how to assess an organization's current risk profile and effectively reduce risk with metadata framework technology.

By Michelle Silva
New Universal Platform Surpasses Existing Solutions with Increased Awareness, Automation and the Industry’s Best Threat Prevention

By Varonis Systems Inc.
Varonis Systems Inc. has welcomed the publication of PricewaterhouseCooper’s global economic crime survey 2011, but cautions that in order to report economic fraud to the relevant authorities companies must be aware that a fraud has taken place.

By UKFast
A cyber security expert reveals that hackers and business bosses share common traits.

By PR Artistry
Major reseller and supplier to the MOD sees significantly increased demand for top level security solutions

By Michelle Silva
Survey of Information Security Managers, CISOs and Network Administrators Finds Intrusion Prevention is Most Important NGFW Component

By Season Crawford
What immediate action needs to be taken to prepare for CIP 4 implementation? How can the private sector and government partner effectively? Find out now.

By Michelle Silva
Cybersecurity Leader Joins Open Virtualization Alliance (OVA) Expanding Support for Heterogeneous Virtualization Environments

By IQPC
Dan Summers, Information Security Specialist for the Royal Mail Group joins Helen Winsor of Technology IQ to discuss the evolution of future threats in cyber security.

By UKFast
Most complex passwords cracked by cheap consumer hardware

By SECNAP Network Security
SECNAP Network Security is proud to congratulate our strategic partner, SLPowers, on being named among the top 50 small businesses of 2011 by Business Leader magazine.

By Michelle Silva
Cybersecurity Leader Outlines Process for Protecting Dynamically Changing Environments from Fast-Moving and Sophisticated Attacks

By Evergreen Advisors
Evergreen Advisors is pleased to announce that Rick Kohr will be a panelist at the “Maryland’s Cyber Battleground APG to Ft. Meade: The Regional Impact and Global Reach of the New Cyber Technology,” Corridor Inc. conference on Sept 22, 2011.

By Advance IT Minnesota
Join the discussion on how to keep our young safe online

By Spencer Bisgaard
Patrick Miller, President and CEO of National Electric Sector Cybersecurity Organization (NESCO) will present solutions to one hundred muniicpal executives at the 2011 Municipal Smart grid Summit

By Nirmala D'souza
Europe and North America are improving while spam from Brazil, Russia and Romania is on the increase in the latest 'Dirty Dozen' of spam-relaying countries




Page updated every 10 minutes


  1. SiteMap
  2. Contact PRLog
  3. Privacy Policy
  4. Terms of Service
  5. Copyright Notice
  6. About
  7. Advertise
Like PRLog?
9K2K1K
Click to Share