An Error Was Encountered

Error Number: 1054

Unknown column 'cache_on' in 'field list'

UPDATE `aff_pdf_cache` SET `cache` = 'a:10:{i:0;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"251185\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:69:\"Upcoming Webinar On Build and Streamline Your Security and Compliance\";s:11:\"description\";s:453:\"Delivering security and compliance services can be a time consuming, difficult-to-manage process for MSP´s, MSSP´s and anyone else offering these services. Automation of these processes can speed engagements, simplify management, deliver higher value to end users and allow you to focus on growing your practice. Join eGestalt for a free webinar where we will show you how SecureGRC can help you do this with some of its exciting new features.\";s:5:\"thumb\";s:87:\"images/t/2512/upcoming-webinar-on-build-and-streamline-your-security-and-compliance.jpg\";s:6:\"thumb2\";s:88:\"images/t2/2512/upcoming-webinar-on-build-and-streamline-your-security-and-compliance.jpg\";s:9:\"permalink\";s:69:\"upcoming-webinar-on-build-and-streamline-your-security-and-compliance\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:1;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"297941\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:13:\"aujasnetworks\";s:9:\"author_id\";s:5:\"77726\";s:14:\"author_website\";s:21:\"http://www.aujas.com/\";s:5:\"title\";s:142:\"Global Information Risk Management (IRM) company Announces Partnership with Exafort to Offer Information Security and Risk Management Services\";s:11:\"description\";s:288:\"The solution and services includes Compliance & Risk Management, Data Protection, Identity Management Solution, Network-Based Security and User Education. This offering will help Cloud services customers protect sensitive data and address concerns of security, compliance and privacy.\";s:5:\"thumb\";s:118:\"images/t/2980/global-information-risk-management-irm-company-announces-partnership-with-exafort-to-offer-informati.jpg\";s:6:\"thumb2\";s:119:\"images/t2/2980/global-information-risk-management-irm-company-announces-partnership-with-exafort-to-offer-informati.jpg\";s:9:\"permalink\";s:100:\"global-information-risk-management-irm-company-announces-partnership-with-exafort-to-offer-informati\";s:5:\"pages\";s:1:\"0\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:2;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"586372\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:19:\"ieeecomputersociety\";s:9:\"author_id\";s:5:\"59084\";s:14:\"author_website\";s:24:\"http://www.computer.org/\";s:5:\"title\";s:68:\"Attend IEEE Symposium on Security and Privacy, May 18-21 in San Jose\";s:11:\"description\";s:193:\"Registration is open for the 35th annual IEEE Symposium on Security and Privacy (May 18-21) and the Security and Privacy Workshops (May 17-18) at the Fairmont San Jose Hotel in San Jose, Calif.\";s:5:\"thumb\";s:85:\"images/t/5864/attend-ieee-symposium-on-security-and-privacy-may-18-21-in-san-jose.jpg\";s:6:\"thumb2\";s:86:\"images/t2/5864/attend-ieee-symposium-on-security-and-privacy-may-18-21-in-san-jose.jpg\";s:9:\"permalink\";s:67:\"attend-ieee-symposium-on-security-and-privacy-may-18-21-in-san-jose\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:3;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"554289\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:12:\"jamesrichard\";s:9:\"author_id\";s:6:\"601898\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:59:\"Security and Privacy in the Cloud - webinar By Melvin Greer\";s:11:\"description\";s:720:\"Overview: Many organizations today are feeling pressure to reduce IT costs and optimize IT operations. Cloud computing is rapidly emerging as a viable means to create dynamic, rapidly provisioned resources for operating platforms, applications, development environments, storage and backup capabilities, and many more IT functions. \n\nA staggering number of security considerations exist that information security professionals need to consider when evaluating the risks of cloud computing. Serious discussion of cloud security starts with a detailed introduction to the various delivery models of cloud computing ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between. \";s:5:\"thumb\";s:75:\"images/t/5543/security-and-privacy-in-the-cloud-webinar-by-melvin-greer.jpg\";s:6:\"thumb2\";s:76:\"images/t2/5543/security-and-privacy-in-the-cloud-webinar-by-melvin-greer.jpg\";s:9:\"permalink\";s:57:\"security-and-privacy-in-the-cloud-webinar-by-melvin-greer\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:4;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"574398\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:12:\"leeshaferrnr\";s:9:\"author_id\";s:6:\"625045\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:67:\"Growth of Homeland Security and Emergency Management Market to 2018\";s:11:\"description\";s:723:\"This report presents a complete analysis of the global homeland security market across the next five years. It analyses about the factors driving the market, the challenges faced by the industry and about the factors restraining the growth of the market. It also discusses the key industry trends, market trends and technology trends that is about to influence the global homeland security market. It provides a complete market size of the global homeland security market over the next five years and talks about the market share by different sub-sectors. It provides insight in to regional trends in spending and analysis the market size by region and also provides data on spending patterns by sub-sector for each region.\";s:5:\"thumb\";s:85:\"images/t/5744/growth-of-homeland-security-and-emergency-management-market-to-2018.jpg\";s:6:\"thumb2\";s:86:\"images/t2/5744/growth-of-homeland-security-and-emergency-management-market-to-2018.jpg\";s:9:\"permalink\";s:67:\"growth-of-homeland-security-and-emergency-management-market-to-2018\";s:5:\"pages\";s:1:\"5\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:5;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"594367\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"piyucool\";s:9:\"author_id\";s:6:\"624847\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:88:\" Security and Surveillance Radar Market is expected to reach worth $8.61 Billion by 2020\";s:11:\"description\";s:205:\"[161 Pages Report] Security & Surveillance Radar Market report provide detailed analysis of the market for military and commercial security & categorizes global market by Sub-sectors & Country.\";s:5:\"thumb\";s:104:\"images/t/5944/security-and-surveillance-radar-market-is-expected-to-reach-worth-8-61-billion-by-2020.jpg\";s:6:\"thumb2\";s:105:\"images/t2/5944/security-and-surveillance-radar-market-is-expected-to-reach-worth-8-61-billion-by-2020.jpg\";s:9:\"permalink\";s:86:\"security-and-surveillance-radar-market-is-expected-to-reach-worth-8-61-billion-by-2020\";s:5:\"pages\";s:1:\"2\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:6;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"407801\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:133:\"HIPAA/HITECH Compliance: How to effectively manage the security and compliance status for your business associates and subcontractors\";s:11:\"description\";s:238:\"Please join us for an educational webinar on April 2, 2013, 11:00am PST and April 9, 2013, 11:00am PST, exclusively designed to address the HIPAA/HITECH requirements for medical providers and their Business associates and sub-contractors.\";s:5:\"thumb\";s:118:\"images/t/4078/hipaa-hitech-compliance-how-to-effectively-manage-the-security-and-compliance-status-for-your-busine.jpg\";s:6:\"thumb2\";s:119:\"images/t2/4078/hipaa-hitech-compliance-how-to-effectively-manage-the-security-and-compliance-status-for-your-busine.jpg\";s:9:\"permalink\";s:100:\"hipaa-hitech-compliance-how-to-effectively-manage-the-security-and-compliance-status-for-your-busine\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:7;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"576791\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:19:\"ieeecomputersociety\";s:9:\"author_id\";s:5:\"59084\";s:14:\"author_website\";s:24:\"http://www.computer.org/\";s:5:\"title\";s:70:\"IEEE Security and Privacy Magazine to Host CISO Viewpoint Panel at RSA\";s:11:\"description\";s:253:\"Cigital CTO Dr. Gary McGraw will lead a panel of security industry leaders in a discussion of how established security principles operate in today\'s charged security environment during IEEE Security & Privacy magazine\'s panel at RSA Conference 2014.\";s:5:\"thumb\";s:88:\"images/t/5768/ieee-security-and-privacy-magazine-to-host-ciso-viewpoint-panel-at-rsa.jpg\";s:6:\"thumb2\";s:89:\"images/t2/5768/ieee-security-and-privacy-magazine-to-host-ciso-viewpoint-panel-at-rsa.jpg\";s:9:\"permalink\";s:70:\"ieee-security-and-privacy-magazine-to-host-ciso-viewpoint-panel-at-rsa\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:8;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"251187\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:88:\"Upcoming webinar on Software Automation to Simplify Your Security and Compliance Process\";s:11:\"description\";s:130:\"Join eGestalt for a free webinar where we will show you how SecureGRC can help you do this with some of its exciting new features.\";s:5:\"thumb\";s:106:\"images/t/2512/upcoming-webinar-on-software-automation-to-simplify-your-security-and-compliance-process.jpg\";s:6:\"thumb2\";s:107:\"images/t2/2512/upcoming-webinar-on-software-automation-to-simplify-your-security-and-compliance-process.jpg\";s:9:\"permalink\";s:88:\"upcoming-webinar-on-software-automation-to-simplify-your-security-and-compliance-process\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:9;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"253313\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:15:\"charlesmartin17\";s:9:\"author_id\";s:5:\"79407\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:125:\"Abu Dhabi National Energy Company PJSC Oil & Gas Exploration and Production Operations and Cost Analysis – Q1, 2012\";s:11:\"description\";s:601:\"Abu Dhabi National Energy Company PJSC Oil & Gas Exploration and Production Operations and Cost Analysis is the latest report from GlobalData, the industry analysis specialists, that offers comprehensive information on the operational and financial performance of the company. The report is an essential source for key operational data, analysis and strategic insight into company. The report provides latest annual and quarterly overview of production, reserves, share price performance, reserve changes, capital expenditures, acreage, performance metrics and results of oil & gas operations.\";s:5:\"thumb\";s:118:\"images/t/2534/abu-dhabi-national-energy-company-pjsc-oil-gas-exploration-and-production-operations-and-cost-analys.jpg\";s:6:\"thumb2\";s:119:\"images/t2/2534/abu-dhabi-national-energy-company-pjsc-oil-gas-exploration-and-production-operations-and-cost-analys.jpg\";s:9:\"permalink\";s:100:\"abu-dhabi-national-energy-company-pjsc-oil-gas-exploration-and-production-operations-and-cost-analys\";s:5:\"pages\";s:1:\"2\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}}', `cache_on` = '2015-02-27 11:51:55' WHERE `aff_id` = '894800'