PR.com is a leader in paid and free press release distribution.
To reach journalists, increase online visibility, and attract new customers,
submit via our global online news and press release distribution service to
top search engines, thousands of websites, social media, blogger networks,
as well as via print, broadcast, radio, mobile channels, and more.
The webinar addressed IoT in hospitals and healthcare settings, reviewed possible scenarios where cyber risks could cause bodily injury and detailed how medical device companies can protect themselves and their device users. - April 21, 2017 - Tactical Network Solutions
GuideIT launches its cyber security suite of solutions. GITSecure, a blend of consulting and managed services, is designed for protecting data, systems and people from cyber threats through prevention, mitigation and remediation. - April 21, 2017 - GuideIT
The suspects - of Moroccan descent - were traveling from Istanbul when they were flagged by Securiport’s global security system and arrested immediately. - April 19, 2017 - Securiport
EMKA discuss the importance of securing sensitive data in data centres, colocation facilities or technical data repositories. - April 19, 2017 - EMKA (UK) Ltd
With Version 4.8, Smart Card Management Leader Adds Strong Focus on User Side of Managing Security Credentials with Self-Service Improvements. - April 19, 2017 - Versasec AB
Launch Consulting has acquired LearnBIG, increasing its capacity and reach in customer experiences with video-based services. - April 18, 2017 - Launch Consulting - a Direct Technology Firm
This unique Earth Day offer clearly demonstrates CyberCrunch's support for identity theft protection, CyberCrunch utilizes safe and secure techniques in all aspects of their client services. - April 18, 2017 - CyberCrunch
Criminal activities resulting from recent Airbnb account hacks demonstrate the critical need for improved identity verification and trust in the peer-to-peer and sharing market. - April 14, 2017 - Trust Stamp
SAP closed a critical vulnerability, which affects a SAP’s search engine TREX, identified by specialists at ERPScan. - April 14, 2017 - ERPScan
Few security products have generated as much interest in recent years as Security Defense Systems Worldwide, Inc. (“SDSW”) GIL-2001-2DLV Anti-Terrorist/Security Door Access Control System. Recognizing this trend, the team at SDSW has increased their manufacturing, marketing and installations... - April 13, 2017 - Security Defense Systems Worldwide
Digital Defense Vulnerability Research Team (VRT) detected the previously unknown vulnerabilities while developing new audit modules for its patented vulnerability scanning technology. - April 12, 2017 - Digital Defense Inc.
Sia (sia.tech), a Boston-based subsidiary of Nebulous Inc., has announced their integration with popular open-source Dropbox/Google Drive alternative Nextcloud (nextcloud.com) to provide users with seamless decentralized private cloud storage.
“Sia and NextCloud share the vision of giving customers... - April 11, 2017 - Sia (Nebulous Inc.)
mSpy helps parents to observe, control and protect their children’s web access, and has released a shocking new commercial to open people’s eyes to the dangers children face online. - April 10, 2017 - mSpy
FedRAMP Authorized Secure Hosted UC Honored for Exceptional Innovation - April 09, 2017 - collab9
Companies afraid of IoT hacks can proactively protect their devices. - April 08, 2017 - Tactical Network Solutions
Information Security Media Group, the leading media provider to the information security community, launched its global summit series for 2017 with a March 28-29 Fraud & Breach Prevention Summit in San Francisco. Senior information security practitioners and leading technology providers convened... - April 06, 2017 - Information Security Media Group
Asgent to Introduce Coronet’s Network Security Solution throughout Japan. The agreement enables Asgent to leverage Coronet’s technology and introduce an enhanced security offering as an MSS (Managed Security Service), whereby it will manage the security policy settings and operations on behalf of its customers. - April 05, 2017 - Coronet
Trust Stamp, with its REALTOR® exclusive product Trust Stamp for Realty, announced today that the Georgia Association of REALTORS® has chosen their product to continue to provide a safe working environment for its members.
Trust Stamp allows the REALTOR® to verify the identity of a potential... - April 04, 2017 - Trust Stamp
This report aims at estimating the market size and future growth potential of Europe Cyber Security market across different segments like- solution, service and country. - April 02, 2017 - Market Research Hub
Panda’s objective is to address the need to adapt data security practices and thereby give its clients a competitive advantage. Disregarding the requirements of the GDPR could lead to fines of up to 20,000,000 euros, or for some even more costly data sanctions. - April 02, 2017 - Panda Security
For the third time the Identity and Access Management company PATECCO will be a silver sponsor and exhibitor at the European Identity & Cloud Conference 2017, organised by Kuppingercole. It takes place May 09 – 12, 2017 at the Dolce Ballhaus Forum Unterschleissheim, Munich, Germany. EIC 2017... - April 01, 2017 - PATECCO
Strategically located in the heart of Europe, ICT Spring Europe 2017 will gather more than 5,000 key decision makers in IT, finance, banking, space, web, manufacturing and marketing, as well as investors, entrepreneurs, and start-ups from over 70 countries, on May 9th and 10th in Luxembourg. The organizers... - March 31, 2017 - topseos.com
Securiport, the global leader in intelligent immigration controls and civil aviation security solutions, was pleased to present at this year’s exclusive World Border Security Congress in Casablanca, Morocco.
The World Border Security Congress is supported by the Ministry of Interior of Morocco,... - March 29, 2017 - Securiport
When a growing family business needed IT services, it turned to KDG’s small business IT support team for help. - March 29, 2017 - The Kyle David Group, LLC
Evaluation of Multiple Biometric Subsystem Vendor’s Products for SFAR. - March 28, 2017 - iBeta Quality Assurance
There’s a constant rumbling about IoT standards, but little talk on how they must be built. - March 28, 2017 - Tactical Network Solutions
In addition to recent recognition for their remarkable growth, the Phoenix-based contract security firm is again recognized for the security services they provide. - March 24, 2017 - Transcend Security Solutions
Silent Breach cyber security agency announced this morning it will be offering free remote network vulnerability assessment to customers. - March 24, 2017 - Silent Breach
Mirza was recognized as a serial entrepreneur and business builder with a history of success and innovation within the Information Security and Cyber Security sectors. - March 20, 2017 - CTM360
Three-peat Award Win Demonstrates Continued Success in Hedge Fund Cybersecurity Landscape. - March 17, 2017 - eSentire
Ecrio’s iotaTM MTC VoLTE Software Available for Chipset Integration - March 16, 2017 - Ecrio Inc.
Anonabox Routers Release new faster Hardware on all products and new firmware with additional features. - March 16, 2017 - Anonabox LLC
Phoenics Electronics, a fully franchised, technically supportive, stocking Distributor of semiconductor, board level and server solutions, today announced their market leading sales growth from 2015 to 2016. With revenues increasing from $54M in 2015 to $106M in 2016, while supporting over 300 customers, Phoenics is quickly on its way to becoming a Top 10 Distributor over the next few years. - March 15, 2017 - Phoenics Electronics
Announces Support for Secure Element by Trusted Objects in Partnership with Avnet Silica - March 15, 2017 - UbiquiOS
Cypherbridge FIDO Software Toolkits for eWBM MS500 and MS1000 Platforms Deliver Highly Integrated FIDO Solutions for Consumer and IoT Applications. - March 13, 2017 - Cypherbridge Systems LLC
J.D. LeaSure, President/CEO of ComSec LLC announces the addition of IMSI catcher detection capabilities to ComSec’s world-class electronic eavesdropping / detection services. Surreptitious use of IMSI (international mobile subscriber identity) catchers and stingray devices pose a significant threat... - March 08, 2017 - ComSec LLC
SecureMySocial, a leading provider of social media security software, is proud to announce that it has once again been named to the Cybersecurity 500, a global compilation of the 500 leading companies that provide cybersecurity solutions and services. In the Q1 2017 report, SecureMySocial moved up to... - March 08, 2017 - SecureMySocial
SMi announced: Waterfall Security solutions to share developments for control systems security to “stay ahead of the bad guys.” - March 06, 2017 - SMi Group
IT Security Reseller Mission Critical Systems and Exabeam, a provider of security intelligence and management solutions, announce a new partnership today. - March 04, 2017 - Mission Critical Systems
ERPScan Security Monitoring Suite is considered as the Most Innovative in the Enterprise Security Solutions category. - March 04, 2017 - ERPScan
Secardeo GmbH expands its software platform TOPKI for the automated distribution of certificates and private user keys to mobile devices. With certPush Mail you can transfer private keys from a central key archive simply to mobile devices using a secure e-mail based method. With the extension certPush... - March 04, 2017 - Secardeo GmbH
Can anyone have their identity taken? eVestigator Simon Smith, a well known Cyber Security expert explains that no matter how smart you are you, you are susceptible to human error and deception known by a process called "social engineering." This concept he describes is a form of human deception in Cyber Security that most readers are likely to be a victim of at some stage in their lives. He makes it clear that one cannot control what one does not know. - March 03, 2017 - eVestigator Cyber IT & Forensic Expert IT Services
A quarter of 110 tested Android security apps failed to offer even basic protection, one third offer a very good protection. - March 03, 2017 - AV-Comparatives
LCPSoft has announced the release of a new product: JRecoverer for Linux Passwords 1.1.0. The program imports hashes of user passwords of various Linux distributors from a shadow file from a local computer or a remote computer using an SSH protocol, restoring original passwords using one of three methods. - March 03, 2017 - LCPSoft
360-degree Visibility Across Network, Endpoint, and Cloud Enables Unparalleled Threat Detection and Response from Fully Managed Security Operations Center (SOC) - March 02, 2017 - eSentire
DropSecure announced today the general availability of their new offering for the SMB market. The new service designed for small- and medium-sized businesses delivers military-grade security for file transfers. With this release, DropSecure becomes one of the most advanced secure file transfer solutions... - March 01, 2017 - DropSecure
With browsers vulnerable to attack from cyber crime, Interchange and Cyberinc can help deliver 100% web freedom from malware based attacks. - February 28, 2017 - Interchange Group
60 Percent of IoT Developers Are Not Following Industry Best Practices for Designing Secure IoT Devices - February 26, 2017 - Barr Group
Cybersecurity company top ranked for cutting edge approach to delivering managed services. - February 24, 2017 - Digital Defense Inc.