Please turn on your JavaScript for this page to function normally.
Ghost USB honeypot released

Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …

Cloud-based endpoint security with protection for Exchange Server

Panda Security released Panda Cloud Office Protection Advanced, a cloud-based endpoint security solution with protection for Exchange Server. This new module is fully …

Data privacy protection for Hadoop

Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy …

nCircle automates new PCI DSS requirements

nCircle PureCloud automates the new internal vulnerability scan requirements included in the most recent update to the Payment Card Industry Data Security Standard (PCI DSS). …

Email encryption on iOS and Android

Voltage Security announced Voltage SecureMail Mobile Edition, a comprehensive program designed to extend data-centric security to a new generation of mobile devices. The …

Tenable Security unveils Log Correlation Engine 4

Tenable Network Security announced the availability of Log Correlation Engine (LCE) version 4. By combining normalized log data from devices throughout enterprise networks …

PCI compliance scan for Google Drive

CloudLock announced a pattern matching engine that identifies, classifies, and secures sensitive information, including Personally Identifiable Information (PII), PCI data and …

One-click backup for Facebook and Flickr

Seagate introduced Backup Plus storage devices with one-click backup and the ability to save and share your content on Facebook and Flickr. Seagate Backup Plus hard drives …

Prevent metadata leaks with Metadacte 2.0

Litera released Metadacte 2.0, allowing companies to prevent metadata leaks, including information sent from mobile devices. Key new features include the ability to clean …

Static analysis technology for web application security

Coverity has extended static analysis to deeply understand both source code and modern web application architecture, providing greater accuracy and remediation guidance to …

Mobile workspace offers a secure Windows OS on any computer

Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business …

Create secure web applications with Sentinel Source

WhiteHat Security announced Sentinel Source, a solution for creating secure online applications from inception to launch. With the ability to track source code development for …

Don't miss

Cybersecurity news