Click to Share
 
 
  1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution
Filter News
Show All Results
News By Country
News By Tag
Information Security Remove
Related Tags


April 2014
Su Sa Fr Th We Tu Mo
20 19 18 17 16 15 14

information security Press Releases

  + XML/RSS  



By Megamind Training Institute
Taught by International Security Expert - Krag Brotby, CISM and CGEIT, principal author of the official ISACA CISM® Review Manual

By Information Security Forum
Global Vice President Steve Durbin will discuss the continuing Bring Your Own Device (BYOD) and mobile device in the workplace trend and offer an information-centric approach to assessing and managing the associated risks

By ISSA-LA
A diverse group of nearly 800 leading cybercrime experts, information security professionals, and C-suite business executives recently attended the most successful ISSA-LA Cybercrime Summit.

By Information Security Forum
According to the Information Security Forum (ISF), a global, independent information security body considered the world's leading authority on cyber security and information risk management, developing a cyber resilience strategy is the only way for...

By ICS-ISAC
Washington DC, June 20, 2013 - The Industrial Control System – Information Sharing and Analysis Center (ICS-ISAC) announced today Sourcefire, Inc., a leader in intelligent cybersecurity solutions, has joined as a supporting member in a collaborative...

By Dynetics
Recognizing the growing demand for information security education and training, the EC-Council, in conjunction with Dynetics, has put together some of the most sought after technical training and certification classes offered by top training companies...

By Prevendra, Inc.
Prevendra's CEO and Co-Founder Christopher Burgess will participate in Suits & Spooks discussions on Cyber Threat Intelligence and Act on June 15th and 16th, 2013. This 2 day conference will be held at the Marriott La Jolla hotel.

By Information Security Forum
ISF has found that with cloud-based systems come inherent challenges and these are further complicated as data subject to privacy regulation inevitably moves into the cloud.

By Paladion Networks
The advisory is a study on the recent 45 million USD ATM heist that affected two banks in Middle East

By Information Security Forum
Leading Information Security Organization Finds When Boards and CISOs Engage Successfully, Businesses are More Likely to Realize Strategic Benefits

By KEMP Technologies
LoadMaster family gets Pre-Authorisation, Single Sign-On (SSO) and Persistent Logging at no additional cost

By Nth Generation
Join NTH Generation at our 13th Annual Symposium -over $7 Million Dollars in solutions will be on the showroom floor for demonstration and test-drives of Security, Mobility, BYOD, Virtualization, Cloud Computing, Business Intelligence, and Big Data.

By SBL Ltd
SBL, leading information security resellers based in York, received the award at the recent Infosecurity Europe Exhibition in London.

By Egress Software Technologies Ltd
Egress Software Technologies’ latest information security survey reveals that the business won’t be denied when it comes to sharing sensitive data – whatever the risk

By Information Security Forum
Organizations go to great lengths to secure intellectual property and other sensitive information internally, yet when that information is shared across the supply chain, security is only as strong as the weakest link.

By SECUDE
Capitalizing on radical changes to 2013 Microsoft Active Directory Rights Management Services (AD RMS), SECUDE establishes its pioneering “Middleware” approach between SAP and Microsoft environments.

By Careerlinecourses Australia
I.T. professionals, small business owners, or anyone involved in managing their company’s IT security can avail of information technology security courses at Careerlinecourses Australia.

By Information Security Forum
Challenges Arise as Data Subject to Privacy Regulation Moves to the Cloud

By SPHERE Technology Solutions
SPHERE Technology Solutions, New Jersey’s fastest growing, woman-owned services firm, hosted an evening of “Compliance with Cocktails!” with over 40 top IT, Security and Information Executives.

By Information Security Forum
Research Finds That Sharing Information in the Supply Chain Creates Risk That Must be Understood and...

By Data Security, Inc.
LINCOLN, NE- Data Security, Inc. located in Lincoln, Nebraska, has just unveiled their new SSMD-2mm Destruction Device which disintegrates solid state and optical media to particles 2mm in size or smaller.

By ISSA-LA
Ira Winkler, president of the Information Systems Security Association to be a featured speaker at the LA Chapter of the Information Systems Security Association Fifth Annual Information Security Summit on Tuesday, May 21, 2013, in Los Angeles

By Information Security Forum
The Information Security Forum (ISF), a global, independent information security body considered the world's leading authority on cyber security and information risk management, has joined the World Economic Forum’s (WEF) Partnering for Cyber...

By www.deity.gov.in
The Global High on Cloud Summit powered and organized by BE Summits to be held between the 12th & 14th of June, 2013 in Mumbai, receives endorsement & support from the Department of Electronics & Information Technology, Ministry of...

By Tracesmart
Tracesmart further demonstrates its commitment to data security and management with the addition of the DataSeal award.

By Information Security Forum
Understanding threats is fundamental to enterprise risk management; threats need to be evaluated in the context of the organization to determine risk.

By Trianz
Trianz, a global consulting and turnkey execution services firm, has entered into a strategic partnership with Watchful Software, a leading provider of data-centric information security solutions, to broaden its data management solutions and serve...

By BE Summits Pvt. Ltd.
No. 1 Cloud Computing event in India. Under the support of the Ministry of Communications & IT along with their flagship NeGP

By Data Security, Inc.
Laboratory testing has shown that formatting, deleting and overwriting methods do not erase hard drives, leaving sensitive information like credit card numbers, medical histories and classified information in danger of being compromised.

By SBL - Information Security Specialists
Information security specialists, SBL, are currently looking for articles for the third issue of their CyberTalk magazine.

By Information Security Forum
The biggest risk to organizations is from known threats, this according to Threat Horizon 2015, the latest in a series of Threat Horizon reports from the Information Security Forum (ISF).

By commissum
The information security firm commissum has again sponsored a prize for the best student on the Open University course “Information Security Management”. The prize takes the form of a book token, and is awarded annually.

By CRC Press
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold.

By Verne Global
Certification assures the highest levels of data protection from data centre campus in Iceland

By Arsenal Recon
The Premier Windows® Registry Analysis Solution Becomes Even More Powerful

By SoftPressRelease
Entensys, a leading Russian developer of information and online security tools, announces the release of UserGate Proxy & Firewall 6.0.

By GuruCul Solutions
Info Security Products Guide, the industry's leading information security research and advisory guide, has named GuruCul Risk Analytics a finalist for the 2013 Global Excellence Awards in the Security Products and Solutions for Enterprise category.

By commissum
A photographer’s zoom lens caused an embarrassing data leak, stemming from a photograph of an advisor carrying a sensitive document in plain view. Information security company commissum comments on the implications for national cyber-security.

By ClubHack
Dinesh Bareja (Open Security Alliance – Indiawatch) & ClubHack founder Rohit Srivastwa put together a risk and threat listing which will identify the top 5 for the nation (India), its people and it’s corporations.

By help AG
Award given in recognition of security expert's excellence in solution delivery and customer support

By Tracesmart
Consumer information business demonstrates Data Protection Act standards

By Cloud Security Alliance (CSA), Seattle Chapter
New Seattle Chapter of Cloud Security Alliance (CSA) is hosting a kickoff luncheon, Thursday, Jan. 10th, 2013. Presenting Microsoft Chief Information Security Officer (CISO) Bret Arsenault and CSA founder Jim Reavis. The event is open to the public.

By Payatu Technologies
Nullcon announcing it's Training's at " Nullcon Goa 2013" on 27 & 28 Feb 2013...

By CRC Press
Endorsed by the (ISC)2, this book provides unrivaled preparation for the certification exam that is both up to date and authoritative.

By GuruCul Solutions
GuruCul Solutions has partnered with NetApp® to improve data protection for intellectual property and classified or highly-regulated information.

By Information Security Forum
The Information Security Forum today announced it's top security threats for 2013 including: cyber security, supply chain security, Big Data, data security in the cloud and mobile devices in the workplace.

By Information Security Forum
Latest ISF report helps organizations implement capability for post-incident review, by addressing key steps at each stage: Impact Assessment, Root Cause Analysis and Recommendations

By Null Information Security Community
Pune 19/ 11/2012 - Ahead of the Nullcon’s 5th International Information Security Conference Goa 2013, the Nullcon Information Security Conference, Popularly known as Nullcon has today launched its new interactive Nullcon Goa 2013 website.

By Integrity Technology Systems, Inc.
Ankeny business owner and ISSA – Des Moines Chapter President, Dave Nelson, was among 18 new Fellow Program members honored by the Information Systems Security Association (ISSA) ® on October 26 during the ISSA International Conference 2012.

By ITevent.net
The Certified ISO 27005 Risk Manager Course offered by International Management Forum will take place in Veenendaal on 17 Sep 2012.




Page updated every 10 minutes


  1. SiteMap
  2. Contact PRLog
  3. Privacy Policy
  4. Terms of Service
  5. Copyright Notice
  6. About
  7. Advertise
Like PRLog?
9K2K1K
Click to Share