software
Detecting mobile device vulnerabilities using Nessus
This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.
Free data masking download
Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …
iOS digital identity app WISeID 4.0 released
WISeKey lauched WISeID 4.0 for iOS. The digital identity app can create an accountable identity from its personal data organizer, which securely stores private details such as …
Good Technology enhances enterprise mobility solutions
Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …
Free tool diagnoses PC issues
Webroot System Analyzer is a fast way for IT professionals to analyze the security profile and performance of individual machines. This free PC-assessment tool scans system …
iPad app for enterprise single sign-on
OneLogin announced OneLogin for iPad which seamlessly extends OneLogin’s cloud-based identity access management solution, allowing mobile users to easily move from …
Trend Micro Mobile Security 8.0 released
Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …
Encryption for Microsoft Office 365
CipherCloud unveiled CipherCloud for Office 365, a cloud encryption gateway that transparently encrypts all email message, calendar, and contact data stored in …
Metasploit Pro increases vulnerability management efficiency
Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …
Real-time fraud prevention with PhoneID Contact
TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …
Rapid password cracking using Pico FPGA-based hardware
ElcomSoft updated two password recovery tools, employing Pico FPGA-based hardware to greatly accelerate the recovery of passwords. Users of Elcomsoft Phone Password Breaker …
Real-time IP address blocking of DDoS attacks
Corero Network Security is extending its capabilities with the launch of ReputationWatch. It will identify in real-time known malicious entities and block access to …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA