software
Duo Security launches secure mobile ID
Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …
Modeling, customizing, and automating applications with AWS OpsWorks
Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …
Antibot: Network-based botnet removal tool
Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …
BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities
BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …
SmartShare: Free tool for secure social sharing
Veracode released SmartShare, a free tool designed to offer developers, bloggers and marketers a more secure method of on-site bookmark sharing. With more online content being …
CA streamlines identity and access management
CA announced its CA CloudMinder identity and access management (IAM) service solution. CA CloudMinder provides enterprise-grade IAM for both cloud-based or on-premise …
Zscaler delivers big visibility security analytics
Zscaler unveiled new analytics technology that gives enterprise security professionals real-time visibility into all employee internet activity across web, cloud email, and …
McAfee delivers unified rapid-response security management
McAfee is raising the bar on intelligent threat identification, time to respond and robust, unified security management with the latest updates to its security management …
Opportunistic scanning from cloud to endpoint
iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …
Unintended, malicious and evil applications of augmented reality
Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …
Privacy and security incident management for healthcare
A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …
F-Secure Client Security updated with threat detection technology
As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, …