Modern Listing Example
Senstar Introduces The UltraLink Rugged Controller
Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce…
Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR
Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than…
Asterisk appoints Mike Loss and Daniel Marsh as Information Security Consultants
Asterisk Information Security has announced it is growing its team with the addition of two…
The Software Alliance increases cash reward up to $20,000 for qualified software piracy leads
Increased reward to drive awareness of cybersecurity risks posed by use of unlicensed software The…
Australian tech company “an Indispensable Part” of Süddeutsche Zeitung and ICIJ Panama Papers Investigation
Australian technology company Nuix supplied document processing and investigation technology that was essential to the…
ISACA Outlines Five Steps to Planning an Effective IS Audit Program
A new report from global IT association ISACA identifies five steps organisations should take to…
Senstar Adds Video Management Software to Its Security Portfolio
Customers to benefit from seamless integration Senstar is pleased to announce the addition of a…
How to guard against compromised fitness apps
Connected fitness bands, watches, and other wearables, along with their smartphone fitness apps, are becoming…