Learn more in the Directory!
There's an unspoken agreement that consumers and companies enter into millions of times a day: Consumers get free products that they value (Facebook and Twitter), and the companies show them semi-personalized and relevant ads to pay for the service. But survey after survey shows that Americans value privacy but feel resigned to not having much when they venture online. Businesses live in fear of a data breach that would undermine the public’s trust in their company and cost them revenue and shareholder value.
Posted Oct 05, 2015
Consumer products like fitness trackers and smart thermostats are among the most easily identifiable "things" of the Internet of Things. But the IoT also has a buttoned-up side. Many enterprises are deploying sensor-packed devices that gather data and can communicate with other devices through the internet. Their benefits can be wide ranging, and they include the potential for improving decision-making capabilities and creating efficiencies through automation. There's a catch, though: These data-rich, connected technologies can pose security risks. Cybercriminals have their eyes on the IoT, too.
Posted Sep 18, 2015
Arxan Technologies, a provider of application protection solutions, announced the publication of its fourth annual "State Of Application Security Report," with new research on the ecosystem for pirated software and digital assets. Conducted by Arxan and iThreat Cyber Group (ICG), the report reveals that illegal reproduction and distribution of copyrighted material on the web is booming as a result of security breaches in both mobile and desktop software applications.
Posted Jul 07, 2015
The Media Trust, which monitors and protects the online and mobile advertising ecosystem, announced the release of Resolution Services, a SaaS-based service that provides real-time information sharing with upstream and downstream business partners about malicious ads detected in a client's own operation. Designed for publishers, ad networks, ad exchanges, demand platforms, and paid-content engines, Resolution Services' continuous, real-time information sharing compresses cycle times for malware detection, notification, and remediation from several days to seconds, drastically reducing infected tags' ability to harm site visitors and its brand reputation. By compressing this cycle, companies can speed incident remediation, protect revenue by ensuring ad tags stay active, and strengthen business relationships by improving intra-industry communication and cooperation.
Posted Apr 23, 2015
Kaltura, provider of video technology platforms, announced a Universal DRM (Digital Rights Management) solution, adding support for DASH and the Common Encryption (CENC) standard, which enables media companies, content rights owners, and OTT providers to stream premium content without needing to worry about which browser, device, or platform is being used. The solution also aims to reduce storage costs and integration fees. With Google and others moving to deprecate or disable existing content protection systems, and Google choosing to disable NPAPI (Netscape Plugin Application Programming Interface) support in the Chrome browser in April 2015, Kaltura's Modular DRM allows video service providers to transition without disrupting service.
Posted Apr 14, 2015
Absio Corporation (Absio), a cybersecurity and data control software development company, announced the release of a secure email application called Absio Dispatch. Absio Dispatch is an easy-to-use application, or plug-in to Microsoft Outlook, that automatically encrypts every email message and attachment, and maintains that encryption everywhere without changing the way people use email.
Posted Apr 07, 2015
KnowBe4 has announced the release of its automated Voicemail Phishing Security Test module, giving IT Managers the ability to test users on social engineering via the phone. As criminals have expanded their repertoire, moving into new territory with automated voicemail phishing (vishing) attacks, KnowBe4 has countered with a new module loaded with five Kevin Mitnick VST Scenarios that can be used to keep users on their toes with security top of mind.
Posted Sep 16, 2014
Digi-EXPress, LLC, a provider of global automated rights solutions, announces Digi-EXPress Rights Life-Cycle (RLC). It is an Automated e-Commerce System for acquiring, managing and selling licenses for company owned content and third party media content. These business transformation processes (protected by Digi's patent 8,438,113), are embedded within Digi-EXPress RLC Software a suite of cloud-based Global Automated Rights Solutions and 'best practice' business processes.
Posted Sep 11, 2014
Rightscorp, a provider of monetization services for artists and holders of copyrighted Intellectual Property (IP), announced that it plans to expand its copyright monetization services into the consumer book publishing market. Rightscorp will soon represent authors and publishing companies by monitoring and monetizing their digital assets against copyright infringement and illegal downloading.
Posted Apr 15, 2014
Sookasa, Inc., a provider of compliance for popular cloud applications and mobile devices, introduced Sookasa Cloud Compliance Service, a Compliance as a Service solution that simplifies the protection of sensitive files across popular cloud services and mobile devices. Sookasa enables professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA.
Posted Apr 10, 2014
Lumeta Corporation announced the addition of cloud and virtual machine (VM) versions of its Lumeta IPsonar and Lumeta Enterprise Situational Intelligence (ESI) network situational awareness solutions. With these new deployment capabilities, customers can take advantage of the convenience and quick implementation of a software-as-a-service (SaaS) delivery model, as well as benefit from a pay-as-you-go alternative to on-premises infrastructure. Additionally, because Lumeta ESI listens to and crawls physical or virtual networks in near-real time, ESI enables organizations to gain network situational awareness of their presence in private, public, and hybrid clouds.
Posted Mar 18, 2014
Based on initial results with Ford Fiesta, Chiquita, Xbox, Salvation Army, United Way of Southeastern Michigan, Moosejaw, and Kabam, Are You a Human-- a Detroit start up that specializes in game-based verification systems -- has broadly launched PlayThru a verification ad unit that allows marketers to deliver a brand message while users play a quick game to prove they are, well, human. PlayThru can replace CAPTCHA, a series of distorted characters traditionally used by websites.
Posted Oct 29, 2013
Copyright Clearance Center, Inc. (CCC), a not-for-profit organization creating global licensing and content solutions for copyright, announced key findings from Outsell's 2013 study on Enterprise Information Access, Consumption and Use. According to the data, 48% of executives believe it's acceptable to share information as long as it's not used for commercial purposes, and 45% believe digital or print paid information is fine to share.
Posted Jul 22, 2013
In light of Edward Snowden's recent disclosure that the NSA is keeping tabs on our every electronic move, it's hard not to think about privacy (or the lack thereof). While I often try to ignore it, sometimes it feels like science fiction movies (starring Tom Cruise...of course) about the watchful eye of the government are slowly becoming reality. That's when I begin worrying about the fabric of society. Shouldn't we all be worried about our privacy (especially if Tom Cruise isn't going to fix this problem)? Not surprisingly though, some of us worry more than others.
Posted Jul 04, 2013
A collaboration between different parts of the global creative industry, under the umbrella of the Linked Content Coalition (LCC), has resulted in the creation of a technical Framework to make it possible to manage and access online rights information across all types of media and content.
Posted Apr 08, 2013
John Wiley & Sons, Inc., announced that Journal of Cellular and Molecular Medicine and Microbial Biotechnology have joined the Wiley Open Access publishing program. All articles from these two journals are now open access and free to view, download, and share.
Posted Feb 19, 2013
Effective immediately De Gruyter and Versita will be publishing all Open Access content under the uniform application of Creative Commons license CC BY-NC-ND. This means that publications may be copied, disseminated, and otherwise made public with a few conditions.
Posted Feb 14, 2013
Insight Enterprises, Inc. -- a global technology provider of hardware, software, and service solutions -- announced the expansion of its InsightCloud Solutions Center, with the addition of Cloud Business Provisioning, powered by dinCloud.
Posted Feb 12, 2013
Talis announced the launch of its new software service -- Talis Aspire Digitised Content. Developed with the collaboration of university library partners, The Copyright Licensing Agency (CLA), and using data supplied via the OCLC xISBN service, the new software service will help universities and colleges in the United Kingdom manage complex digitization workflows, and help ensure they are compliant with copyright legislation.
Posted Jan 15, 2013
In 2007, Wiley acquired Blackwell Publishing, growing its Scientific, Technical, Medical, and Scholarly (STMS) content to more than 1,500 journals, 9,000-plus books, reference works, and databases offered in print and electronically. This content is invaluable to the world's research and scholarly communities, and granting permission for reuse of this information posed a great challenge for Wiley's rights and permissions team. Following the merger, Wiley was suddenly receiving hundreds of permissions requests each day, with no efficient way to provide prompt turnaround. Its former manual email-based procedure would not suffice, and Blackwell's semi-automated method was also not satisfactory. Customers and employees alike were frustrated, and Wiley knew that it needed a solution that would please everyone and streamline the process.
Posted Nov 07, 2012
If you were in Europe on Friday and found that you couldn't access your Facebook account, you may have Anonymous to blame. Twitter users Portugal, Sweden, Ireland, and Norway reported Facebook outages. Subsequently, a Twitter account associated with the hacking group claimed responsibility, according to CBS News.
Posted Oct 15, 2012
Users looking to remove embarrassing or unwanted pictures from Facebook had more thana few complaints because if a picture was deleted from Facebook, it could still be seen by anyone with the original URL.
Posted Aug 20, 2012
Tor/Forge Books, a Macmillan imprint, announced in April that it would remove DRM (digital rights management) from its books. Many readers and authors were ecstatic. They believe that DRM is too restrictive and hinders end users from using/storing/sharing/enjoying ebooks in perfectly legal ways. Naysayers were sure that removing DRM was like handing over the keys to the store to digital pirates and that sales would plummet.
Posted Aug 16, 2012
The Federal Trade Commission claims that Facebook deceived developers over security ratings due to a lacking review and verification process, according to ZDNet. The investigation by the FTC found that Facebook did not take the proper steps to review applications the company was supposed to review which could have led to dangerous software getting promoted on Facebook.
Posted Aug 14, 2012
Experience Media Studios announced a new service called Piracy Protection to support the independent film and content publishing industry from piracy. The company says that with Piracy Protection, EMS can anticipate, detect, target, disrupt, and remove access on the channels where piracy occurs.
Posted Aug 07, 2012