1. Articles in category: Security

    169-192 of 195 « 1 2 3 4 5 6 7 8 9 »
    1. Webroot adds its BrightCloud IP Reputation Service as part of HP Enterprise Security

      Webroot adds its BrightCloud IP Reputation Service as part of HP Enterprise Security

      BROOMFIELD – Webroot, a market leader in cloud-based, real-time Internet threat detection, today announced its Webroot BrightCloud IP Reputation Service will be offered as part of the HP Enterprise Security Products portfolio to enhance visibility into threats introduced to customer networks by corporate and employee-owned mobile devices.

      Read Full Article
    2. Level 3 and HP form alliance to help customers better manage, protect data stored in cloud

      Level 3 and HP form alliance to help customers better manage, protect data stored in cloud

      BROOMFIELD – Level 3 Communications (NYSE: LVLT) announced the addition of HP Helion Managed Cloud Service to the Level 3 Cloud Solutions ecosystem, which allows enterprises and government agencies to establish secure connections to HP Helion Managed Cloud Service using Level 3’s Virtual Private Network (VPN) and security services in North America, Latin America and Europe.

      Read Full Article
    3. National Cyber Security Awareness Month 2014

      National Cyber Security Awareness Month 2014

      The Internet is part of everyone’s life, every day. We use the Internet at work, home, for enjoyment, and to connect with those close to us.

      However, being constantly connected brings increased risk of theft, fraud, and abuse. No country, industry, community, or individual is immune to cyber risks. As a nation, we face constant cyber threats against our critical infrastructure and economy.

      Read Full Article
    4. Ping Identity and Identity Over IP Join Forces with Cisco to Provide a More Secure Cloud without Additional Passwords ...

      Ping Identity and Identity Over IP Join Forces with Cisco to Provide a More Secure Cloud without Additional Passwords ...

      Ping Identity®, The Identity Security CompanyTM, and Identity Over IP today announced they are joining forces as solution partners within Cisco’s Identity Services Engine ecosystem to secure the Internet of Things as well as the public, private and hybrid clouds of today’s enterprise.

      Read Full Article
    5. Event: Crisis Communications for any Organization

      Event: Crisis Communications for any Organization

      Agility has created two easy ways to help you prepare a disaster recovery & business continuity plan.

      Join us for a weekly webinar

      During an emergency, it is imperative that those within your organization know how to communicate effectively. This includes bot internal and external communications, and applies to emergencies of all types, large and small.

      Read Full Article
      Mentions: Community Events
    6. CTA Unwired: Enterprise Mobility Management- Security without Compromising User Experience.

      CTA Unwired: Enterprise Mobility Management- Security without Compromising User Experience.

      Enterprise Mobility Management-Security without Compromising User Experience​

      Speaker: Brian Robison

      Brian has over 15 years of experience in enterprise mobility, security and risk management. He led Global Enterprise Solution Strategy at Good Technology for 2 years. His prior core focus included enterprise security management and vulnerability assessment strategy at both McAfee and Tripwire Inc.

      Read Full Article
      Mentions: CTA Events
    7. Expert educates about cyber security during final Seminars at Steamboat event

      Expert educates about cyber security during final Seminars at Steamboat event

      According to Richard Danzig, Americans need to realize they are living on a diet of poisoned fruit when it comes to technology.

      "The diet is nutritious, but it's also poisonous," said Danzig, the final speaker for the Seminars at Steamboat 2014 summer season.

      Danzig is a former Secretary of the Navy and today is a consultant to the Unites States Departments of Defense and Homeland Security.

      Read Full Article
    8. Top five cyber security mistakes

      Top five cyber security mistakes

      Recent headlines confirm that cyber attacks are growing in scale and incidents are on the rise.

      Organizations are increasingly vulnerable as a result of technological advances and a changing workplace, including remote access, big data, cloud computing, social media and mobile technology.

      The amount and importance of data continues to grow, as does the sharing of information via online networks. Organizations increasingly open their IT systems and lose direct control of data security.

      Read Full Article
    9. LogRhythm clinches big VC round; IPO a 'possibility in our future,' says CEO

      LogRhythm clinches big VC round; IPO a 'possibility in our future,' says CEO

      Another Colorado technology company has landed a big infusion of venture capital that sets it up to become a big company and possibly go public. Investors Boulder-based LogRhythm Inc., maker of business cybersecurity technology, announced a $40 million round led by Menlo Park, California-based venture capital firm Riverwood Capital. Other investors included Adams Street Partners, Westminster-based Access Venture Partners, members of LogRhythm’s senior management and new investor Piper Jaffray…

      Read Full Article
    169-192 of 195 « 1 2 3 4 5 6 7 8 9 »
  1. Popular Articles

  2. Categories

    1. Feeds:

      CTA Members Press Releases, CTA Tech Tour, Government & Policy, Tech Workforce & Education
    2. Tags:

      B2B Software, Big Data & Analytics, Business Services Provider, Cloud, Community Organizations, Consumer Software, Development, Energy Tech, Enterprise, Government, Hardware, Health IT, Innovation & Entrepreneurship, Internet of Things, Mobile, Security, Startups, Telecom, Women In Tech