Video Screencast Help

Search

Search results

What else keeps you up at Night? In cooperation with the ECRI Institute, AAMI (Association for the Advancement of Medical Instrumentation) just published their 2014 report on  ...
Blog Entry by Axel Wirth | 14 Jul 2014 | 0 comments
Symantec Security Dashboards Need complete visibility into your environment?  Do you find yourself reactive to breaches or always behind intrusions?  MetriX dashboards can provide ...
Blog Entry by ryanschoenherr | 08 Jul 2014 | 0 comments
It’s the bug that continues to make global headlines over a month after its discovery. The Heartbleed vulnerability in OpenSSL has been called “the biggest fault in internet security history”, but what exactly is it? How much damage has really been ...
Video by jcrawford2009 | 20 May 2014 | 0 comments
A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats. Despite the ...
Blog Entry by vgtero | 02 May 2014 | 0 comments
With the recently discovered Heartbleed vulnerability, information security professionals and end users are feeling the pressure and impact to better protect their information. The task of securing your organization and information can seem overwhelming. ...
Blog Entry by vgtero | 24 Apr 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
The Concept of Zero-Trust   ( republished from http://security-musings.com  )       To allow for near-future work models, where employees can bring their own mobile devices into the workplace,  where “work from home” ...
Blog Entry by mike_ball | 10 Oct 2013 | 0 comments
Webcast Tue, 15 October, 2013 - 10:00 - 11:00 PDT Join our upcoming webcast to learn about a new ...
Event by Elspeth Magoria | 26 Sep 2013 | 0 comments