Please turn on your JavaScript for this page to function normally.
Detecting mobile device vulnerabilities using Nessus

This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.

Free data masking download

Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …

iOS digital identity app WISeID 4.0 released

WISeKey lauched WISeID 4.0 for iOS. The digital identity app can create an accountable identity from its personal data organizer, which securely stores private details such as …

Good Technology enhances enterprise mobility solutions

Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …

Free tool diagnoses PC issues

Webroot System Analyzer is a fast way for IT professionals to analyze the security profile and performance of individual machines. This free PC-assessment tool scans system …

iPad app for enterprise single sign-on

OneLogin announced OneLogin for iPad which seamlessly extends OneLogin’s cloud-based identity access management solution, allowing mobile users to easily move from …

Trend Micro Mobile Security 8.0 released

Trend Micro launched Trend Micro Mobile Security (TMMS) 8.0 which enhances the enforcement of existing password and encryption policies as well as provides more granular …

Encryption for Microsoft Office 365

CipherCloud unveiled CipherCloud for Office 365, a cloud encryption gateway that transparently encrypts all email message, calendar, and contact data stored in …

Metasploit Pro increases vulnerability management efficiency

Rapid7 introduced the means to increase vulnerability management efficiency by leveraging intelligence from its penetration testing solution, Metasploit Pro, to validate …

Real-time fraud prevention with PhoneID Contact

TeleSign announced the newest product in the PhoneID suite, which helps online businesses block fraud by delivering name and address details based on a phone number. PhoneID …

Rapid password cracking using Pico FPGA-based hardware

ElcomSoft updated two password recovery tools, employing Pico FPGA-based hardware to greatly accelerate the recovery of passwords. Users of Elcomsoft Phone Password Breaker …

Real-time IP address blocking of DDoS attacks

Corero Network Security is extending its capabilities with the launch of ReputationWatch. It will identify in real-time known malicious entities and block access to …

Don't miss

Cybersecurity news