Technology -> Security
Entourage Security selects SmartTask to boost customer service and operational performance
Entourage Security Management has adopted SmartTask, an advanced employee scheduling and mobile workforce management solution
Date: 9th April 2015 | Published By: SmarTask
Concerns about data privacy online force British consumers to take control - YouGov research reveals 72 percent of British consumers concerned about private information online
Research reveals 72% of British consumers concerned about private information online, UK ICO urges businesses to invest in data privacy.
Date: 9th April 2015 | Published By: CloudMask
Becrypt signs new SME partnership with Atos UK - Atos SME Harbour programme gives opportunities for innovative SMEs to win government business
Becrypt has entered into the Atos SME Harbour programme, designed to provide a way for Atos to partner with small and medium sized enterprises in projects
Date: 7th April 2015 | Published By: PR Artistry
15,435 vulnerabilities in close to 4,000 applications in 2014 - Secunia Vulnerability Review 2015 reports 18% increase in vulnerabilities compared to year before
Secunia analyzes the evolution of software vulnerabilities from a global, industry and endpoint perspective and publishes findings in annual report
Date: 25th March 2015 | Published By: PR Artistry
Becrypt announces publication of CESG approved guidance for tVolution - End User solution for remote working successful in tests against 12 govt security recommendations
Becrypt's end user security solution tVolution meets government requirements enabling safe remote working and enterprise Thin Client for public sector
Date: 24th March 2015 | Published By: PR Artistry
CrowdControlHQ responds to new FCA paper with 5 social media compliance and risk management tips - Financial Conduct Authority recognises importance of managing social media in regulated industries
CrowdCrontrolHQ publishes tips on how to meet new FCA March 2015 guidance on social media designed to protect the consumer and businesses from loss or closure
Date: 20th March 2015 | Published By: PR Artistry
Five ways to manage social media with a capital "M" from CrowdControlHQ - How to manage social media issues for business
Michelle Leavesley, Marketing Manager of CrowdControlHQ describes five ways to manage social media effectively
Date: 10th March 2015 | Published By: PR Artistry
CloudMask solves privacy and multi-jurisdiction collaboration challenges for the Canadian Government - CloudMask to share best practices on data privacy with the UK Govt at Security and Policing 2015
CloudMask today announced it will attend Security and Policing 2015, the UK's premier security and law enforcement event.
Date: 5th March 2015 | Published By: CloudMask
Five Active Risk customers scoop top honours at IRM Global Risk Awards 2015 - Sword Active Risk congratulates five clients including Dubai Roads and Transport Authority and EMEC
The Institute of Risk Management Global Risk Awards provide unique international recognition of excellence
Date: 3rd March 2015 | Published By: PR Artistry
CloudMask launches free tool for SMEs and consumers to protect data from hackers - Self-service data security model allows all users to control when and how they share sensitive data
CloudMask, an innovator in masking data from hackers, today launches a free tool to enable consumers and SMEs to have better control of their data security.
Date: 22nd January 2015 | Published By: CloudMask
The Finance Industry raises the bar for successful social media risk management says CrowdControlHQ - Social media is fast becoming a valuable multi faceted communications to drive commercial success.
The finance industry is waking up to the power of engaging with customers through social media as clients go online resources for information and advice.
Date: 15th January 2015 | Published By: PR Artistry
CloudMask partners with Bellstone Consultancy Group to offer data protection in the UK
As organisations re-evaluate data protection, partnership sees an increased focus on protecting digital information in the security and defence sector
Date: 15th January 2015 | Published By: CloudMask
What makes a great Risk Management Team? Active Risk says a good mix of personalities - Specialist risk management software supplier publishes infographic with ideal risk management team
Sword Active Risk today published a new infographic depicting the make up of the ideal risk management team based on a survey of deployments of enterprise risk management solutions
Date: 10th December 2014 | Published By: PR Artistry
Advanced 365 offers top tips for ensuring compliance with new EU data security legislation - UK businesses found guilty of breaking new data laws could face fines of up to £780,000
Major changes to EU data security legislation are expected to become law in 2015, however, many UK organisations have yet to ensure they are compliant.
Date: 8th December 2014 | Published By: Advanced Computer Software
IT Directors Ignore Social Media at their Peril, says CrowdControlHQ - Marc Harris, CTO of CrowdControlHQ, examines the issues of social media for IT Directors
IT Directors use Linkedin and Twitter, when it comes to corporate social media they pass it to the marketing department. Should they take ownership?
Date: 26th November 2014 | Published By: PR Artistry
Sword Achiever announces appointment to leadership team - Supplier of enterprise risk and compliance solutions focuses on customer and product development
Sword Achiever, a specialist supplier of risk, audit and compliance management solutions, is expanding its management team.
Date: 18th November 2014 | Published By: PR Artistry
Compass to offer further education providers affordable, super-fast disaster recovery service - Partnership with Plan B to guarantee 100% success of full data recovery
Compass Computer Consultants (Compass), a leading supplier of education software to the further education (FE) sector, today announces an official partnership.
Date: 15th October 2014 | Published By: Advanced Computer Software
AccessData comments on 'Shell Shock' bug affecting UNIX, Linux and Mac OS devices - Digital forensics and cyber incident response company, AccessData, offers advice to IT system admins
Cyber incident response company, AccessData, has advised IT system admins to monitor for suspicious activity to identify any exploitation of the shell shock bug
Date: 29th September 2014 | Published By: AccessData
RandomStorm urges systems administrators to scan for "Shell Shock" security vulnerability - - IT system administrators should scan all connected devices and servers running GNU Bash Shell-
Security and compliance company, RandomStorm, has offered IT systems guidance on how to test for the GNU bash vulnerability on UNIX, Linux and Mac OS devices
Date: 26th September 2014 | Published By: RandomStorm
Zylpha and safedrop formalise partnership for secure legal document delivery
Zylpha (www.zylpha.com), the UK's leading legal systems innovator has formalised a partnership with safedrop (www.safedrop.com) for its widely acclaimed secure
Date: 17th September 2014 | Published By: Zylpha
Published by: electronicdawn Ltd.