1400 total news stories found.
2009-01-10 | The Hague, ID Control, the specialist in advanced online identity and access management today announced to fight online identity theft and fraud with a hassle free managed service by which users' identities are protected with strong and advanced authentication tokens based on a monthly fee per user.
2008-12-26 | Dataline's expert on Cloud Computing Security lent his knowledge to the highly discussed topic of Cloud Computing in the White House for NPR's top rated show "All Things Considered"
2008-12-03 | Disaster recovery planning is critical in order to sustain the business in the event of an unplanned outage such as a fire, flood, explosion, hurricane, tornado, crime, loss of power, etc. Persson Associates now offers an easy to use/do it yourself, low cost, planning tool to develop a plan.
2008-11-19 | Tracker I-9 enterprise software system for ensuring Form I-9 compliance offers a comprehensive E-Verify solution for federal contractors.
2008-11-16 | Tracesmart aim to make IOD fraud a thing of the past
2008-11-14 | Newcomer in the fast growing online storage industry, Kazabra.com, is now finally releasing their much awaited backup client that lets users backup their computers in an easy and efficient manner.
2008-11-10 | Forecast Steep Declines in Sales of Video Surveillance, CCTV, IP Video and Other Security Products as Obama Reduces Funding for Security and Decreases Global Tensions
2008-11-06 | Real-time video monitoring on mobile phone. View live images from security cameras on cell phone using any kind of internet connection from any location in the world.
2008-10-29 | DeepSec 2008, the in-depth security conference from Nov 11 -14 in Vienna (Austria) is set on closing dangerous security leaks.
2008-10-17 | What if we took an entirely new approach to the spam problem?
2008-10-08 | All companies need to prepare a disaster recovery plan (DRP) for their computer centers and critical business units. Many simply don't know where to start. The products offered by Persson Associates contain a logical and comprehensive, easy to follow format. They are priced within every budget.
2008-10-04 | Rockville-based IT Services Company Recognized for a Fourth Time by Deloitte
2008-09-27 | Renowned security THOUGHT LEADER Caroline Hamilton will be discussing the elements and procedures required for completing a Red Flag Risk Assessment, and reviewing tools to assist in the successful completion of a risk assessment for Credit Unions who are facing the November 1st Red Flag Deadline.
2008-09-21 | Tracesmart, the first company to be approved by the GRO to receive new Death Registration Information (DRI)
2008-09-19 | Visual Data Systems, the leader in online marketing and technology solutions for the vacation rental industry in now offering Proactive Server & Systems Health Monitoring Services through its technology consultanting division.
2008-09-17 | Integrated Computer Services, Inc. announced today that it has attained the Small Business Specialist certification from Microsoft.
2008-09-10 | Password dialog that perfectly resists attacks by trojan horses and computer viruses developed. The software-only solution could make input of PIN codes and Transaction Numbers for online banking completely safe in the near future.
2008-09-08 | A disaster such as a fire, flood, hurricane, etc can destroy a business work location. Today, any department that supports a critical business process (Orders, Billing, etc) should have a "Business Unit" disaster recovery plan in place to facilitate a quick and efficient recovery response.
2008-08-29 | OPC Unified Architecture is the latest OPC specification for universal industrial data connectivity released by the OPC Foundation. The OPC Training Institute is scheduled to explain how this standard will impact the manufacturing industry worldwide.
2008-08-26 | Censorship comes in all shapes and sizes, from trivial to momentous, and is hardly difficult to find in the world today. We generally look towards legislative and/or political solutions to this diseaseof institutional censorship, but we must also remember that, today, other solutions exist.