- All Industry
- Aerospace / Defense
- Alternative Energy
- Apparel / Textiles
- Construction / Building
- Energy & Oil
- Food Safety
- Fraud / identity Theft
- Leisure / Hospitality
- Logistics / Shipping
- Manufacturing / Production
- Mining / Metals
- Oil / Energy
- Paper / Forest Products
- Plumbing, Heating & AC
- Public Utilities
View Releases by:
May 13, 2015 -- Learn how businesses put a dollar number on their data security during iScan Online's 5-state “Know Your Security Number” Angelbeat tour. iScan Online will be joined by partner Torus Technologies...
May 12, 2015 -- Dashlane, the world’s leading password manager, announces the hiring of Jeff Paradise as Chief Marketing Officer, and Chuck Kimble as Vice President of New Business.
May 12, 2015 -- RMX is excited to introduce a new website!
May 12, 2015 -- The third annual conference of the Secure Cash & Transport Association will take place September 23-25, 2015 at the Hyatt Chicago Magnificent Mile.
May 12, 2015 -- In May 2015 Tom Cain - Attorney At Law launched their redesigned website which provides potential clients with helpful education & tools for their legal needs.
May 11, 2015 -- Registration now open; Summit features DDoS Mitigation Demonstration, Live Hack and DDoS Truth and Trends presentations
May 11, 2015 -- NEXT fingerprint sensor drivers now available for Windows 8 and 10
May 08, 2015 -- After poor holiday season sales results coupled with an increase in friendly fraud, many merchants find themselves under pressure. As new technologies add protection to brick-and-mortar stores from...
May 07, 2015 -- RMX announced new brand identity with corporate logo.
May 07, 2015 -- New research from Mercator Advisory Group shows how two deals are changing the complexion of Green Dot’s prepaid business.
May 07, 2015 -- Acquisition gives retailers, restaurants access to additional metrics and insights to better understand customer interactions
May 06, 2015 -- Takes advantage of existing IoT devices to provide smarter identity verification
May 06, 2015 -- Big Data Leader Recognized for Real-Time Fraud Detection and Analytics in Mobile Communications
May 06, 2015 -- Company's FirstStrike® Supplier Portal Offers Access to a Feature-Packed Dynamic Discounting Module
May 05, 2015 -- Latest release of CorreLog’s Agent for SAP version 5.5 monitors more than 80 SAP audit events related to user access for security and compliance violations and in real time, can convert SAP user...
May 04, 2015 -- DMG Productions explores the latest breakthroughs in payment processing solutions.
May 04, 2015 -- A million dollar HIPAA breach can be financially devastating to a medical practice unaware of HIPAA Guidelines. AttendingDR launches a robust IT system with HIPAA Compliance at heart, combined with a...
May 02, 2015 -- McCann Total Security Solutions launches new website that delivers concise service offerings. As part of McCann Investigations, the new website focuses on McCann's TSCM, cyber security and...
May 02, 2015 -- Addition of Seasoned LP Professionals Strengthens Foundation's Vision for Industry
May 01, 2015 -- Webinar to Highlight DDoS Trends and Attack Prevention Methods
May 01, 2015 -- Henley-Putnam University is pleased to host the next installment of its webinar series. On Tuesday, May 5, 2015, at 9:00 PM, EDT, Diane Maye will present “Tips for Obtaining (and keeping) a Security...
April 30, 2015 -- 3PLs, Brokers and non-Asset Based Fleet Managers can eliminate check calls and improve operations with real-time load location, alerts, messaging and GPS-tagged Proof-of-Delivery (POD) without...
April 30, 2015 -- Following the success of its April 2015 Internet of Things / Connected Devices patent auction, ICAP Patent Brokerage announces it will hold a second auction featuring similar ground-breaking...
April 30, 2015 -- Secure Coding Boot Camp, Information Security Boot Camp for IT Professionals, Build Your Own Cyber Range, and Investigating Social Networking Sites/Darknet Investigations are Training Programs...
April 29, 2015 -- Authoritative Data Empowers Company and Users to Identify Callers