Please turn on your JavaScript for this page to function normally.
Analyze mobile apps for malware threats

Trend Micro announced Mobile App Reputation, a technology that can automatically identify, analyze and rate mobile applications for issues that could include malware, …

Cloudify cloud application platform

GigaSpaces Technologies announced Cloudify, a cloud application platform that enables organizations to easily on-board and manage any application, on any cloud, with zero code …

Imation secures mobile data, identity and workspaces

Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …

Cloud-based threat monitoring and response service

FishNet Security launched ThreatDetect, a cloud-based threat monitoring and response service, that allows organizations to proactively respond to emerging threats, meet …

What is Gatekeeper in OS X Mountain Lion

The next version of OS X called Mountain Lion will be available this summer. Among the many new features, it will come with Gatekeeper that will help prevent users from …

Why is residual risk so important?

The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …

Malicious sites increase 240%

In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks, according to Blue Coat …

Nessus 5.0 vulnerability scanner released

Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces …

Trend Micro secures PlayStation Vita gamers

Trend Micro extended its collaboration with Sony and is now offering two web security services – “Trend Micro Kids Safety” and “Trend Micro Web …

Web-based breach tool for healthcare IT

Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …

Secure data with cloud-based encryption

Porticor introduced its Virtual Private Data (Porticor VPD) system, a solution combining data encryption with patented key management to protect critical data in public, …

The Internet of Things: Key Applications and Protocols

The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …

Don't miss

Cybersecurity news