According to a new cyber security report, mobile applications increasingly have become top security threats plaguing enterprises over the past year. The details are outlined in the recently published Hewlett Packard Enterprise (HPE) Cyber Risk Report...
Twistlock is releasing a free version of its signature Container Security Suite that is aimed at providing individual developers and small organizations with the ability to try out containerization. The free “Developer’s Edition” is designed to ...
APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of da...
We visited with Ashok Reddy, CA Technologies’ General Manager – Mainframe, to discuss how the CA Data Content Discovery helps identify data exposure risks on z Systems and reduces these risks by scanning through the mainframe data infrastructure so t...
Security provider buguroo, a U.S. startup and spinoff of Deloitte’s European Security Operations Center (SOC), is launching bugThreats, a threat intelligence platform (TIP) that looks outside the enterprise infrastructure and focuses on useful intell...
Couchbase has announced the general availability of its Couchbase Mobile 1.2 NoSQL database, a new release that offers enhanced enterprise class administration and security.Couchbase Mobile is a NoSQL database solution that delivers NoSQL to mobile. ...
Intercede has released RapID, a security solution that delivers password and token free access to cloud services from mobile applications. In addition, RapID incorporates PKI based authentication and encryption to provide security for business and co...
Mobile developers continue to battle security issues with their apps according to a new report by NowSecure. The annual report, 2016 NowSecure Mobile Security Report, provides insight into the current state of mobile security. According to the r...
Trustonic has released its "Trustonic Hybrid Protection" (THP) which offers built-in device security providing mobile and IoT developers with an adaptable security solution bringing together software and hardware secured solutions into one hybrid pro...
SuccessFull SignUp