Parse error: syntax error, unexpected '.' in /homepages/4/d434919204/htdocs/SPK/wp-content/plugins/wysija-newsletters/index.php(1) : regexp code(1) : eval()'d code(4) : eval()'d code on line 1
Encryption Archives - SecurityPark
Archive | Encryption RSS feed for this section

IFSEC International Serves the Whole Security buying Chain

IFSEC International moved to ExCel London from 17-19 June 2014 and provides a solid platform for a buoyant market. IFSEC International, organised by UBM Live, continues to thrive as the only destination to serve the whole security buying chain, which has been solidified by its move to ExCeL London from 17-19 June. Taking place at its [...]

Read more
Access Control, Alarm systems, Application and software security, Authentication and identity management, Biometric Systems, Bollards, gates and barriers, Building access control system, CCTV cameras and domes, CCTV System, Computer and PC Security, Conferences, Corporate and enterprise security, Credit card fraud, Data management and data security, Detection systems, Door entry systems and locks, E-Learning, Education security and school security, Educational Seminar, Encryption, Endpoint security, Eye biometrics, Face biometrics, Fencing, Financial services and banking security, Fingerprint biometrics, Fire detection and alarm, Fire, Health & Safety, Guard tour system, Hand biometrics, Health & Safety legislation, Home, domestic and residential security, Homeland security and Police, Hospital security and healthcare security, Hotel, restaurant and casino security, Infrastructure and utilities security, Internet and Web security, Intrusion detection, Investigation, IP monitoring, IT Network and Computer Security, Locks and safes, Lone worker protection, Manned Security and Security Guard, Manufacturing security and industrial security, Mobile and Wireless Security, Monitoring systems, Network Security, Other biometric systems, Perimeter Protection, Physical protection, Physical Security, Public Address system, Public Sector security, Remote Monitoring and Surveillance, Retail Security, Safety and protection systems, Security Companies, Security guarding, Security industry, Security market data, Security market sectors, Security personnel services, Security Services, Security training, Sensors and detectors, SME and SMB security, Sport security, event and recreational security, Surveillance, Tagging vandalism and theft prevention, Transport security and logistics security, Voice biometrics, Wireless surveillance

Four information Security Training Courses To Be Delivered by SANS Brussels

SANS Institute in Brussels to deliver quartet of information security training courses. This February, SANS Europe will deliver four  information security training courses covering network penetration testing, forensic investigations, intrusion detection and security essentials. SANS Brussels 2014 runs from Monday the 17th till Saturday the 22nd of February 2014 at the Renaissance Brussels Hotel. Brussels will host [...]

Read more

Sensitive data in the Cloud : CloudUp Networks Acquired by CipherCloud

CipherCloud has acquired CloudUp Networks complementing its market strategy to secure sensitive data in the cloud. CipherCloud continues to focus on developing security innovations that remove the data privacy and compliance barriers to cloud adoption. The company began its cloud protection journey by delivering encryption, tokenisation and Data Loss Prevention (DLP) capabilities that solved the immediate [...]

Read more

HID Global enhances its FARGO Direct-to-Card printer line

HID Global announces : –  Enhanced DTC line increases flexibility with iCLASS SE embedded encoder technology and in-line card personalisation capabilities that enable one-step printing and encoding of multiple credential technologies –   Significant improvements in speeds allow users to produce more cards, more quickly, with the enhanced security of AES-256 encryption, locking hoppers and [...]

Read more

Traditional security measures are ineffective against data breaches

Following the news that electronic data breaches put the personal information of 2.5 million Californians at risk, Dave Anderson, senior director at Voltage Security, comments that the breaches continue to demonstrate that current, traditional security technologies are ineffective, and businesses and Government agencies have to do more to protect sensitive customer information. “These traditional technologies, [...]

Read more

Our love affair with smartphones – and the risk it poses to corporate data

Voltage says latest Experian report highlights our love affair with smartphones – and the risk this poses to corporate data “By all means allow staff to use their smartphones to communicate on the move – using voice, text and basic email. But when it comes to risking the integrity of the company’s data, encryption at [...]

Read more

CESG and Cellcrypt to Develop MIKEY-SAKKE Technology

Cellcrypt (www.cellcrypt.com), a leading provider of encrypted voice calling and messaging for smartphones and tablets, today announced that CESG and Cellcrypt are jointly developing a MIKEY-SAKKE technology solution for securing mobile communications. Cellcrypt (www.cellcrypt.com), a leading provider of encrypted voice calling and messaging for smartphones and tablets, has  announced that CESG and Cellcrypt are jointly [...]

Read more

The Top 5 Brilliant things the Cloud Can Deliver – If You Get Your Security Right

By Dave Anderson, Director of Strategy, Voltage Security Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings. The truth is that the [...]

Read more

Whats on at Infosecurity Europe 2013

Tuesday 23rd April Opening Keynote: The UK Cyber Security Strategy: Opportunities and challenges for the Cyber Security Sector 10:00 – 10:25 Chloe Smith, Minister for Political and Constitutional Reform, Cabinet Office will give the opening keynote on UK Cyber Security Strategy and the opportunities and challenges for the Cyber Security Sector. Panel discussion: Risk: Fostering [...]

Read more