Headquartered in St. Louis, MO with branch offices in Jacksonville and Orlando, FL, SSE is a certified Women-Owned Small Business with 30 years of experience in both the technology and training industries. The company is comprised of two core lines of business, Training Services and Network Services, and serves both commercial and government markets.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

CSA ADDRESSES CONNECTED DEVICE EXPLOSION WITH SOFTWARE-DEFINED PERIMETER INITIATIVE

Infosecurity Magazine | November 19, 2013

news image

That’s especially important as technology consumerization like bring your own device (BYOD) configurations and non-traditional cloud computing infrastructure is supplanting internal IT, and employee-owned devices become the primary devices of choice....

Read More

BUSINESSES FEELING MORE CONFIDENT IN CLOUD SECURITY

Infosecurity Magazine | June 26, 2013

news image

The research showed a marked increase in confidence among respondents in the ability of cloud providers to protect the sensitive and confidential data entrusted to them – up from 41% (2011) to 56% (2012). More than 60% of respondents that use cloud today believe the cloud provider has primary responsibility for protecting that data, and 22% believed the cloud consumer to be responsible. However, the pattern is reversed for users of infrastructure-as-a-service (IaaS) cloud offerings....

Read More

MOST ORGANIZATIONS DON'T ASSESS TIME TO INCIDENT DETECTION AS KEY SECURITY METRIC

Infosecurity Magazine | July 25, 2013

news image

“There’s a strong correlation between security products and metrics,” noted Tim Erlin, director of IT and risk strategy for Tripwire, which sponsored the survey. “Organizations most often build security metrics programs from the data up, rather than the business down, resulting in metrics supported by available security products, rather than focusing on those metrics that are meaningful to the business.”...

Read More

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

news image

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More
news image

CSA ADDRESSES CONNECTED DEVICE EXPLOSION WITH SOFTWARE-DEFINED PERIMETER INITIATIVE

Infosecurity Magazine | November 19, 2013

That’s especially important as technology consumerization like bring your own device (BYOD) configurations and non-traditional cloud computing infrastructure is supplanting internal IT, and employee-owned devices become the primary devices of choice....

Read More
news image

BUSINESSES FEELING MORE CONFIDENT IN CLOUD SECURITY

Infosecurity Magazine | June 26, 2013

The research showed a marked increase in confidence among respondents in the ability of cloud providers to protect the sensitive and confidential data entrusted to them – up from 41% (2011) to 56% (2012). More than 60% of respondents that use cloud today believe the cloud provider has primary responsibility for protecting that data, and 22% believed the cloud consumer to be responsible. However, the pattern is reversed for users of infrastructure-as-a-service (IaaS) cloud offerings....

Read More
news image

MOST ORGANIZATIONS DON'T ASSESS TIME TO INCIDENT DETECTION AS KEY SECURITY METRIC

Infosecurity Magazine | July 25, 2013

“There’s a strong correlation between security products and metrics,” noted Tim Erlin, director of IT and risk strategy for Tripwire, which sponsored the survey. “Organizations most often build security metrics programs from the data up, rather than the business down, resulting in metrics supported by available security products, rather than focusing on those metrics that are meaningful to the business.”...

Read More
news image

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More

Resources

resource image

MARKETING DATA

GRC Platform Buyer's Guide

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us