62.3 F
San Jose
Tuesday, February 18, 2020

Cyber Security

Gil Keini_CEO_Firmitas Cyber Solutions

Providers of operational assurance and cyber-resilience

It is widely acknowledged that Mission Critical Systems or Critical Infrastructure are the primary targets for cyber attacks. Such attacks aim to cause damages, fear, or are of plain criminal intent - used for...
Jim Deleskie, Founder & CTO, Mimir Networks

PROVIDING THE BEST SECURITY FOR NETWORKS OF ALL SIZES

Mimir was launched in 2014 as a company to solve to complex security issues and make them as simple as a single click away. Through its years in business, the company developed its products...
Marc Brungardt, President, Foresite

RELIABIITY IN TIMES OF CYBER CRIMES

We live in a digital world. Everything is seemingly connected to the internet and remotely accessible. Core business functions are rapidly moving to the cloud. This new world is full of our sensitive and...
Jaeson Yoo, Chief Security Evangelist, Penta Security Systems, Inc

FUTURE PROOF WEB AND DATA SECURITY

From most of the security breaches that occur these days, it is quite evident that over 75% of all attacks arise from the web application layer. This naturally indicates that the preferred entry point...
Bob Karschnia, VP/GM of Wireless, Emerson Automation Solutions

Meeting Wireless Network Management Challenges

The proliferation of wireless networks in industrial plants and facilities has provided substantial benefits to end users in the form of improved operations, but has also raised some potential issues. Fortunately, these can be...
Bam Azizi, CTO & Co-Founder NoPassword

MAXIMUM SECURITY WITH NO PASSWORDS

NoPassword was founded in 2014, and launched – NoPassword Identity and Access Management Solution in early 2016. The company came into existence with the vision of a future free of passwords and data breaches,...
Chandra Pandey,Founder and CEO, Seceon Inc.

QUICK TIME RESPONSES FROM SECEON

The biggest problem with data breaches these days is the fact that 95 percent of attacks infiltrate or corrupt data within a few hours of the breach. This gives security personnel hardly any time...
Ben Bernstein, Chief Executive Officer & Co-Founder, Twistlock, Inc.

Securing the Cloud Native Enterprise

Traditionally, security has been a force that slows development, forcing teams to jump through hurdles or await manual policy review before delivering software. In today's world, where every company is a software company, that...
Shawn Campbell, Director of Product Management, SafeNet Assured Technologies

Bringing Biometrics to the Tactical Edge of Security – and Beyond

As security concerns mount domestically and abroad, databases are becoming a potent tactical tool, and a growing number of companies are arming the frontline with biometric tools to help identify threats and persons of...
Yaniv Avidan, Co-Founder & CEO, MinerEye

New article reveals the necessity of information governance and data classification for complying with...

Approaching the new General Data Protection Regulation (GDPR), effective from May 2018, companies based in Europe or having personal data of people residing in Europe, are struggling to find their most valuable assets in...