AdaptiveMobile, a provider of mobile network security, launched its Messaging App Security-a new product that enables messaging applications to secure their user base from increasing volume and sophistication of threats. Messaging applications - such as WhatsApp, Facebook Messenger, Viber and Kik - have experienced exponential growth over the past few years and are forecast to see a threefold increase in message traffic, from almost 31 trillion in 2014, to 100 trillion by 2019 globally.
Posted Jan 26, 2016
The Media Trust, a leader in monitoring and protecting the online and mobile advertising ecosystem, announced the release of Digital Threat Intelligence (DTI), a real-time threat intelligence feed consisting of information on actual malware attacking websites and internet users via compromised ad tags, and any third-party code used to render websites. DTI's intelligence is generated entirely from The Media Trust's own proprietary ad tag and website monitoring service, which scans and analyzes the website source code, ad tags, third-party domains and any external calls executing on the world's largest, most heavily trafficked digital properties for anomalous, suspicious, or malicious activity.
Posted Dec 03, 2015
Sierraware, a provider of virtualization and security, introduced VMI-in-a-Box, which allows small businesses to secure their mobile apps. This new, consolidated solution makes it easier for organizations to securely host mobile apps in the cloud and keep sensitive data off of mobile devices. VMI-in-a-Box simplifies the deployment of SierraVMI Virtual Mobile Infrastructure by providing an integrated and tested hardware appliance or a virtual appliance for KVM, Xen, and VMware ESX hypervisors.
Posted Dec 01, 2015
SDL announced that its management system, SDL WorldServer, has been granted ISO27001 certification by the International Organization for Standardization (ISO). This important designation assures SDL customers that their translation management applications were written and are supported with security in mind, whether their deployment is on premise or SaaS-based.
Posted Nov 03, 2015
DRM means different things to different people. In popular perception, DRM is often associated with controlling access to proprietary content--for instance, preventing music or video file-sharing. To be clear, this article is not about content protection technologies that prevent viewing or using digital assets. Instead, we take an enterprise perspective, and the focus here is on enterprise DRM tools to manage the rights and licensing information associated with digital assets.
Posted Oct 07, 2015
There's an unspoken agreement that consumers and companies enter into millions of times a day: Consumers get free products that they value (Facebook and Twitter), and the companies show them semi-personalized and relevant ads to pay for the service. But survey after survey shows that Americans value privacy but feel resigned to not having much when they venture online. Businesses live in fear of a data breach that would undermine the public’s trust in their company and cost them revenue and shareholder value.
Posted Oct 05, 2015
Consumer products like fitness trackers and smart thermostats are among the most easily identifiable "things" of the Internet of Things. But the IoT also has a buttoned-up side. Many enterprises are deploying sensor-packed devices that gather data and can communicate with other devices through the internet. Their benefits can be wide ranging, and they include the potential for improving decision-making capabilities and creating efficiencies through automation. There's a catch, though: These data-rich, connected technologies can pose security risks. Cybercriminals have their eyes on the IoT, too.
Posted Sep 18, 2015
Arxan Technologies, a provider of application protection solutions, announced the publication of its fourth annual "State Of Application Security Report," with new research on the ecosystem for pirated software and digital assets. Conducted by Arxan and iThreat Cyber Group (ICG), the report reveals that illegal reproduction and distribution of copyrighted material on the web is booming as a result of security breaches in both mobile and desktop software applications.
Posted Jul 07, 2015
The Media Trust, which monitors and protects the online and mobile advertising ecosystem, announced the release of Resolution Services, a SaaS-based service that provides real-time information sharing with upstream and downstream business partners about malicious ads detected in a client's own operation. Designed for publishers, ad networks, ad exchanges, demand platforms, and paid-content engines, Resolution Services' continuous, real-time information sharing compresses cycle times for malware detection, notification, and remediation from several days to seconds, drastically reducing infected tags' ability to harm site visitors and its brand reputation. By compressing this cycle, companies can speed incident remediation, protect revenue by ensuring ad tags stay active, and strengthen business relationships by improving intra-industry communication and cooperation.
Posted Apr 23, 2015
Kaltura, provider of video technology platforms, announced a Universal DRM (Digital Rights Management) solution, adding support for DASH and the Common Encryption (CENC) standard, which enables media companies, content rights owners, and OTT providers to stream premium content without needing to worry about which browser, device, or platform is being used. The solution also aims to reduce storage costs and integration fees. With Google and others moving to deprecate or disable existing content protection systems, and Google choosing to disable NPAPI (Netscape Plugin Application Programming Interface) support in the Chrome browser in April 2015, Kaltura's Modular DRM allows video service providers to transition without disrupting service.
Posted Apr 14, 2015
Absio Corporation (Absio), a cybersecurity and data control software development company, announced the release of a secure email application called Absio Dispatch. Absio Dispatch is an easy-to-use application, or plug-in to Microsoft Outlook, that automatically encrypts every email message and attachment, and maintains that encryption everywhere without changing the way people use email.
Posted Apr 07, 2015
KnowBe4 has announced the release of its automated Voicemail Phishing Security Test module, giving IT Managers the ability to test users on social engineering via the phone. As criminals have expanded their repertoire, moving into new territory with automated voicemail phishing (vishing) attacks, KnowBe4 has countered with a new module loaded with five Kevin Mitnick VST Scenarios that can be used to keep users on their toes with security top of mind.
Posted Sep 16, 2014
Digi-EXPress, LLC, a provider of global automated rights solutions, announces Digi-EXPress Rights Life-Cycle (RLC). It is an Automated e-Commerce System for acquiring, managing and selling licenses for company owned content and third party media content. These business transformation processes (protected by Digi's patent 8,438,113), are embedded within Digi-EXPress RLC Software a suite of cloud-based Global Automated Rights Solutions and 'best practice' business processes.
Posted Sep 11, 2014
Rightscorp, a provider of monetization services for artists and holders of copyrighted Intellectual Property (IP), announced that it plans to expand its copyright monetization services into the consumer book publishing market. Rightscorp will soon represent authors and publishing companies by monitoring and monetizing their digital assets against copyright infringement and illegal downloading.
Posted Apr 15, 2014
Sookasa, Inc., a provider of compliance for popular cloud applications and mobile devices, introduced Sookasa Cloud Compliance Service, a Compliance as a Service solution that simplifies the protection of sensitive files across popular cloud services and mobile devices. Sookasa enables professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA.
Posted Apr 10, 2014
Lumeta Corporation announced the addition of cloud and virtual machine (VM) versions of its Lumeta IPsonar and Lumeta Enterprise Situational Intelligence (ESI) network situational awareness solutions. With these new deployment capabilities, customers can take advantage of the convenience and quick implementation of a software-as-a-service (SaaS) delivery model, as well as benefit from a pay-as-you-go alternative to on-premises infrastructure. Additionally, because Lumeta ESI listens to and crawls physical or virtual networks in near-real time, ESI enables organizations to gain network situational awareness of their presence in private, public, and hybrid clouds.
Posted Mar 18, 2014
Based on initial results with Ford Fiesta, Chiquita, Xbox, Salvation Army, United Way of Southeastern Michigan, Moosejaw, and Kabam, Are You a Human-- a Detroit start up that specializes in game-based verification systems -- has broadly launched PlayThru a verification ad unit that allows marketers to deliver a brand message while users play a quick game to prove they are, well, human. PlayThru can replace CAPTCHA, a series of distorted characters traditionally used by websites.
Posted Oct 29, 2013
Copyright Clearance Center, Inc. (CCC), a not-for-profit organization creating global licensing and content solutions for copyright, announced key findings from Outsell's 2013 study on Enterprise Information Access, Consumption and Use. According to the data, 48% of executives believe it's acceptable to share information as long as it's not used for commercial purposes, and 45% believe digital or print paid information is fine to share.
Posted Jul 22, 2013
In light of Edward Snowden's recent disclosure that the NSA is keeping tabs on our every electronic move, it's hard not to think about privacy (or the lack thereof). While I often try to ignore it, sometimes it feels like science fiction movies (starring Tom Cruise...of course) about the watchful eye of the government are slowly becoming reality. That's when I begin worrying about the fabric of society. Shouldn't we all be worried about our privacy (especially if Tom Cruise isn't going to fix this problem)? Not surprisingly though, some of us worry more than others.
Posted Jul 04, 2013
A collaboration between different parts of the global creative industry, under the umbrella of the Linked Content Coalition (LCC), has resulted in the creation of a technical Framework to make it possible to manage and access online rights information across all types of media and content.
Posted Apr 08, 2013
John Wiley & Sons, Inc., announced that Journal of Cellular and Molecular Medicine and Microbial Biotechnology have joined the Wiley Open Access publishing program. All articles from these two journals are now open access and free to view, download, and share.
Posted Feb 19, 2013
Effective immediately De Gruyter and Versita will be publishing all Open Access content under the uniform application of Creative Commons license CC BY-NC-ND. This means that publications may be copied, disseminated, and otherwise made public with a few conditions.
Posted Feb 14, 2013
Insight Enterprises, Inc. -- a global technology provider of hardware, software, and service solutions -- announced the expansion of its InsightCloud Solutions Center, with the addition of Cloud Business Provisioning, powered by dinCloud.
Posted Feb 12, 2013
Talis announced the launch of its new software service -- Talis Aspire Digitised Content. Developed with the collaboration of university library partners, The Copyright Licensing Agency (CLA), and using data supplied via the OCLC xISBN service, the new software service will help universities and colleges in the United Kingdom manage complex digitization workflows, and help ensure they are compliant with copyright legislation.
Posted Jan 15, 2013
In 2007, Wiley acquired Blackwell Publishing, growing its Scientific, Technical, Medical, and Scholarly (STMS) content to more than 1,500 journals, 9,000-plus books, reference works, and databases offered in print and electronically. This content is invaluable to the world's research and scholarly communities, and granting permission for reuse of this information posed a great challenge for Wiley's rights and permissions team. Following the merger, Wiley was suddenly receiving hundreds of permissions requests each day, with no efficient way to provide prompt turnaround. Its former manual email-based procedure would not suffice, and Blackwell's semi-automated method was also not satisfactory. Customers and employees alike were frustrated, and Wiley knew that it needed a solution that would please everyone and streamline the process.
Posted Nov 07, 2012