Please turn on your JavaScript for this page to function normally.
Auditing of Web apps with analytics dashboard for compliance

SaaSID has launched Cloud Application Manager 2.0 (CAM), the latest version of its browser-based authentication, management and auditing solution. CAM 2.0’s audit report …

Radware launches cloud-based DDoS attack mitigation system

At RSA Conference 2013 in San Francisco, Radware announced DefensePipe, an integrated and comprehensive solution to help mitigate volumetric DDoS attacks which threaten to …

Qualys and Verizon join forces for new IT security and compliance solutions

Qualys and Verizon announced an agreement to expand their relationship to deliver new advanced cloud-based IT security and compliance management services to organizations …

Big Data cloud solutions powered by open source analytics database

At RSA Conference 2013 in San Francisco, Virtustream announced it has partnered with Metamarkets and Skilled Analysts to offer big data solutions in the cloud. There is a …

CloudLock unveils Community Trust Rating

CloudLock unveiled the Community Trust Rating as part of its Cloud Information Security Suite at RSA Conference 2013. The third-party application trust assessment system uses …

Qualys brings vulnerability management to Amazon EC2 and VPC

At RSA Conference 2013 in San Francisco, Qualys announced powerful new vulnerability management capabilities for Amazon EC2 and VPC customers using a QualysGuard connector …

Connect securely to the cloud using JSON and XMPP

At the RSA Conference 2013 in San Francisco, Express Logic and Cypherbridge Systems announced the integration of the Cypherbridge embedded secure Cloud Device Kit for Express …

A framework for building privacy-oriented apps

At the RSA Conference 2013 in San Francisco, SpiderOak announced it is launching privacy into the mainstream with the unveiling of Crypton, a “zero-knowledge” …

F5 Networks releases hybrid cloud solution for mobile application management

F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …

Cloud computing in critical information infrastructure protection

ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …

Opportunistic scanning from cloud to endpoint

iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …

PCI DSS cloud computing guidelines

The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …

Don't miss

Cybersecurity news