Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
COSTA MESA, CA -- (Marketwire) -- 10/24/12 -- ISC8® Inc. (OTCBB: ISCI) ("ISC8" or the "Company"), a provider of intelligent cybersecurity solutions, is pleased to announce that Bill Joll, president and CEO of ISC8, Inc., will present at the Security Research Associates 8th Annual Fall Growth Stock Conference on Tuesday, October 30, 2012 at 10 a.m. Pacific Time.
Conference Details
About ISC8
ISC8 is actively engaged in the development and sale of intelligent cybersecurity solutions for commercial and government environments worldwide. ISC8's Cyber products are aimed at detecting next-generation malware and Advanced Persistent Threats (APTs). ISC8 provides hardware, software and service offerings that enable Enterprise Threat Management leveraging anti-tamper, 3D stacked chip assemblies, high-speed processors, and miniaturized sensors -- all technologies it has developed. ISC8 was founded in 1974 and is headquartered in Costa Mesa, California. For more information about ISC8 visit www.isc8.com.
About Security Research Associates, Inc.
Security Research Associates, Inc. (SRA) was founded in San Francisco in 1980 and, today, offers investment banking and M&A services as well as institutional brokerage services. A boutique firm by design, SRA works with a select group of portfolio managers from around the country and focuses on technology and life science companies in the micro and small cap arenas. For more information about SRA see our web site at www.sracap.com or call us at 415-590-4333.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs