Primitive Logic

IT & Cyber Experts Launch M&A Tech and Security Due Diligence

In an effort to assist organizations discover and mitigate potential risks which can seriously influence the value of an acquisition, Primitive Logic and AsTech Consulting, have launched a Merger & Acquisition (M&A) Tech and...
(ISC)² CEO David Shearer

7th Annual (ISC)² Security Congress, Stand Alone Event Sept 25-27

(ISC)²® today announced their annual Security Congress will be a stand-alone event without former partner ASIS International. It will take place September 25-27 at the JW Marriott in Austin, TX. (ISC)² Security...

Paul Cary Joins Primus Technologies as VP of Operations

Primus Technologies, has announced that Paul Cary has joined the company as Vice President of Operations, reporting to Chris Sullivan, Primus Technologies Chairman and CEO. "Paul's expertise in Lean Manufacturing and operational excellence will...

Cyberbit EDR Adv Cybersecurity with Adaptive, Automated Capabilities

Cyberattacks continue to shift tactics, with hackers launching fileless malware that is undetectable by ransomware safeguards, antivirus and other traditional endpoint protection platforms. Cyberbit's  adaptive Endpoint Detection and Response (EDR) platform, now...
By collecting data from multiple sources throughout retail: mobile devices, guest wireless, POS devices, RFID, video, and others, they can track traffic count, shrink, conversion, time spent, dwell time and more, this data can be stored and analyzed, so retailers can make data-driven business decisions

Innovation for Retail Surveillance Demands Smart Storage – Quantum

Guest Editorial by Wayne Arvidson, Quantum Corporation Retail is undergoing a transformation. Technology disruption and changing customer demographics, shopping preferences and behaviors are driving retailers to adapt. That’s not new - retail has...
Oshkosh Defense

Oshkosh Defense Honored by Wisconsin Council of Safety

Oshkosh Defense was recently recognized at the 23rd Annual Corporate Safety Awards Conference by the Wisconsin Council of Safety in Wisconsin Dells, Wisconsin. The Corporate Safety Award is given to those that...
Evgeniy Mikhailovich Bogachev (Image Credit: FBI)

Inside the Hunt for Russia’s Most Notorious Hacker

Chasing the Phantom By Garrett M. Graff, Illustrations by Chad Hagen, WIRED ON THE MORNING of December 30, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US...
‘CyberVigilant', technology, working with Control Center, detects hacking or performance-affecting anomalies and helps keep your data safe.

IndigoVision ‘CyberVigilant™’ Showcased at ISC West 2017 (Video)

IndigoVision, provided a first glance of their upcoming ‘CyberVigilant™’ cyber security product this week at ISC West 2017, at the Sands Expo and Convention Center in Las Vegas. Birds, fish, even people, move...
A Special Report Co-Sponsored by Thycotic and Cybersecurity Ventures

Failure to Secure: 2016 State of Privileged Account Mgt Report (Video)

Weak privileged account management (PAM) is a rampant epidemic at large enterprises and governments globally. Privileged accounts contain the keys to the IT kingdom, and they are a primary target for cybercriminals...
Eagle Eye Networks

Eagle Eye Adds Video Analytics to Security Camera VMS

Eagle Eye Networks, has launched its first phase of video analytics, which includes line crossing, intrusion detection, and object counting within the Eagle Eye Cloud Security Camera VMS. This is the first...