BIO-Key Forecasts Growth Spurt from FBI Cyber Task Force Endorsement of Biometrics as Part of Multifactor Security November 20, 2019 Steve Sears Off Emerging technologies, News, NJ Tech Companies, Tech for Business, Multifactor authentication (MFA) without a biometric component is just not cutting it when it comes...
TeliApp’s Fetch Internet is A Secure Alternative to Public Wi-Fi, Company Says September 17, 2019 Esther Surden Off News, NJ Tech Companies, Uncategorized, The TeliApp (Linden) team recently announced the launch of their Fetch Internet app, which enables...
“Diving Into the Dark Web, Where Your Data Goes After the Hack,” September 3, 2019 Esther Surden 0 Key presentation and demonstration from featured speaker Steve Stasiukonis from Secure Networks Live demo of...
Want to Learn More About How the Dark Web Uses Your Data? You’ll Find This Sept. 19 Conference Most Enlightening! August 29, 2019 Esther Surden Off News, Sponsored, Uncategorized, This post, written by Esther Surden, contains sponsored content. C-Suite executives are invited to the...
ITCON 2019 May 12, 2019 Esther Surden 0 We’ve organized this event to giving business owners, CIOs, CTOs, and their teams the opportunity...
Don’t Be the Low-Hanging Fruit in a Cyberattack, Scott Schober Tells Audience at FutureCon May 8, 2019 Esther Surden Off News, NJ Tech People, A while ago, Scott Schober was hacked and his accounts were compromised. The hackers even...
ITCON 2019, Security Conference, Announces Date January 9, 2019 Esther Surden 0 Billed as "the premier cybersecurity conference for business owners and C-level executives", ITCON 2019 is...
Cybersecurity Niche Enabling New Growth for Closter-Based Ericom Software, CEO Joshua Behar Says December 4, 2018 Esther Surden Off News, NJ Tech Companies, [Ericom Software (Closter), a nearly 25-year-old New Jersey technology company, has recently seen its fortunes...
Cybersecurity – The Existing Threat to New Jersey’s Manufacturers October 12, 2018 Esther Surden 0 Hackers are now able to effectively penetrate the information systems of small to mid-sized businesses...