Distil Networks, Inc., a provider of bot detection and mitigation, published, "The 2016 Bad Bot Landscape Report: The Rise of Advanced Persistent Bots," an annual report that identifies statistically significant data on global bot traffic. Bad bots are used by competitors, hackers, and fraudsters and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, data theft, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.
Posted Mar 29, 2016
Siftsort.com announced that it has received a patent grant by the United States Patent and Trademark Office for their secure platform that helps people organize important documents and share them with family or trusted professionals. The USPTO published U.S. Patent No. 9,280,670 on March 8, 2016.
Posted Mar 29, 2016
3SI, a provider of delivery secure mobile communications projects, and CommuniTake Technologies, a provider of mobile security and management technology, have announced a multi-phased strategic OEM partnership to address governmental and business market requirements for highly secure wireless communications. The new partnership will fuse security concepts, technologies, platforms, and devices to generate a mobile cybersecurity solution.
Posted Mar 01, 2016
AdaptiveMobile, a provider of mobile network security, launched its Messaging App Security-a new product that enables messaging applications to secure their user base from increasing volume and sophistication of threats. Messaging applications - such as WhatsApp, Facebook Messenger, Viber and Kik - have experienced exponential growth over the past few years and are forecast to see a threefold increase in message traffic, from almost 31 trillion in 2014, to 100 trillion by 2019 globally.
Posted Jan 26, 2016
The Media Trust, a leader in monitoring and protecting the online and mobile advertising ecosystem, announced the release of Digital Threat Intelligence (DTI), a real-time threat intelligence feed consisting of information on actual malware attacking websites and internet users via compromised ad tags, and any third-party code used to render websites. DTI's intelligence is generated entirely from The Media Trust's own proprietary ad tag and website monitoring service, which scans and analyzes the website source code, ad tags, third-party domains and any external calls executing on the world's largest, most heavily trafficked digital properties for anomalous, suspicious, or malicious activity.
Posted Dec 03, 2015
Sierraware, a provider of virtualization and security, introduced VMI-in-a-Box, which allows small businesses to secure their mobile apps. This new, consolidated solution makes it easier for organizations to securely host mobile apps in the cloud and keep sensitive data off of mobile devices. VMI-in-a-Box simplifies the deployment of SierraVMI Virtual Mobile Infrastructure by providing an integrated and tested hardware appliance or a virtual appliance for KVM, Xen, and VMware ESX hypervisors.
Posted Dec 01, 2015
SDL announced that its management system, SDL WorldServer, has been granted ISO27001 certification by the International Organization for Standardization (ISO). This important designation assures SDL customers that their translation management applications were written and are supported with security in mind, whether their deployment is on premise or SaaS-based.
Posted Nov 03, 2015
DRM means different things to different people. In popular perception, DRM is often associated with controlling access to proprietary content--for instance, preventing music or video file-sharing. To be clear, this article is not about content protection technologies that prevent viewing or using digital assets. Instead, we take an enterprise perspective, and the focus here is on enterprise DRM tools to manage the rights and licensing information associated with digital assets.
Posted Oct 07, 2015
There's an unspoken agreement that consumers and companies enter into millions of times a day: Consumers get free products that they value (Facebook and Twitter), and the companies show them semi-personalized and relevant ads to pay for the service. But survey after survey shows that Americans value privacy but feel resigned to not having much when they venture online. Businesses live in fear of a data breach that would undermine the public’s trust in their company and cost them revenue and shareholder value.
Posted Oct 05, 2015
Consumer products like fitness trackers and smart thermostats are among the most easily identifiable "things" of the Internet of Things. But the IoT also has a buttoned-up side. Many enterprises are deploying sensor-packed devices that gather data and can communicate with other devices through the internet. Their benefits can be wide ranging, and they include the potential for improving decision-making capabilities and creating efficiencies through automation. There's a catch, though: These data-rich, connected technologies can pose security risks. Cybercriminals have their eyes on the IoT, too.
Posted Sep 18, 2015
Arxan Technologies, a provider of application protection solutions, announced the publication of its fourth annual "State Of Application Security Report," with new research on the ecosystem for pirated software and digital assets. Conducted by Arxan and iThreat Cyber Group (ICG), the report reveals that illegal reproduction and distribution of copyrighted material on the web is booming as a result of security breaches in both mobile and desktop software applications.
Posted Jul 07, 2015
The Media Trust, which monitors and protects the online and mobile advertising ecosystem, announced the release of Resolution Services, a SaaS-based service that provides real-time information sharing with upstream and downstream business partners about malicious ads detected in a client's own operation. Designed for publishers, ad networks, ad exchanges, demand platforms, and paid-content engines, Resolution Services' continuous, real-time information sharing compresses cycle times for malware detection, notification, and remediation from several days to seconds, drastically reducing infected tags' ability to harm site visitors and its brand reputation. By compressing this cycle, companies can speed incident remediation, protect revenue by ensuring ad tags stay active, and strengthen business relationships by improving intra-industry communication and cooperation.
Posted Apr 23, 2015
Kaltura, provider of video technology platforms, announced a Universal DRM (Digital Rights Management) solution, adding support for DASH and the Common Encryption (CENC) standard, which enables media companies, content rights owners, and OTT providers to stream premium content without needing to worry about which browser, device, or platform is being used. The solution also aims to reduce storage costs and integration fees. With Google and others moving to deprecate or disable existing content protection systems, and Google choosing to disable NPAPI (Netscape Plugin Application Programming Interface) support in the Chrome browser in April 2015, Kaltura's Modular DRM allows video service providers to transition without disrupting service.
Posted Apr 14, 2015
Absio Corporation (Absio), a cybersecurity and data control software development company, announced the release of a secure email application called Absio Dispatch. Absio Dispatch is an easy-to-use application, or plug-in to Microsoft Outlook, that automatically encrypts every email message and attachment, and maintains that encryption everywhere without changing the way people use email.
Posted Apr 07, 2015
KnowBe4 has announced the release of its automated Voicemail Phishing Security Test module, giving IT Managers the ability to test users on social engineering via the phone. As criminals have expanded their repertoire, moving into new territory with automated voicemail phishing (vishing) attacks, KnowBe4 has countered with a new module loaded with five Kevin Mitnick VST Scenarios that can be used to keep users on their toes with security top of mind.
Posted Sep 16, 2014
Digi-EXPress, LLC, a provider of global automated rights solutions, announces Digi-EXPress Rights Life-Cycle (RLC). It is an Automated e-Commerce System for acquiring, managing and selling licenses for company owned content and third party media content. These business transformation processes (protected by Digi's patent 8,438,113), are embedded within Digi-EXPress RLC Software a suite of cloud-based Global Automated Rights Solutions and 'best practice' business processes.
Posted Sep 11, 2014
Rightscorp, a provider of monetization services for artists and holders of copyrighted Intellectual Property (IP), announced that it plans to expand its copyright monetization services into the consumer book publishing market. Rightscorp will soon represent authors and publishing companies by monitoring and monetizing their digital assets against copyright infringement and illegal downloading.
Posted Apr 15, 2014
Sookasa, Inc., a provider of compliance for popular cloud applications and mobile devices, introduced Sookasa Cloud Compliance Service, a Compliance as a Service solution that simplifies the protection of sensitive files across popular cloud services and mobile devices. Sookasa enables professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA.
Posted Apr 10, 2014
Lumeta Corporation announced the addition of cloud and virtual machine (VM) versions of its Lumeta IPsonar and Lumeta Enterprise Situational Intelligence (ESI) network situational awareness solutions. With these new deployment capabilities, customers can take advantage of the convenience and quick implementation of a software-as-a-service (SaaS) delivery model, as well as benefit from a pay-as-you-go alternative to on-premises infrastructure. Additionally, because Lumeta ESI listens to and crawls physical or virtual networks in near-real time, ESI enables organizations to gain network situational awareness of their presence in private, public, and hybrid clouds.
Posted Mar 18, 2014
Based on initial results with Ford Fiesta, Chiquita, Xbox, Salvation Army, United Way of Southeastern Michigan, Moosejaw, and Kabam, Are You a Human-- a Detroit start up that specializes in game-based verification systems -- has broadly launched PlayThru a verification ad unit that allows marketers to deliver a brand message while users play a quick game to prove they are, well, human. PlayThru can replace CAPTCHA, a series of distorted characters traditionally used by websites.
Posted Oct 29, 2013
Copyright Clearance Center, Inc. (CCC), a not-for-profit organization creating global licensing and content solutions for copyright, announced key findings from Outsell's 2013 study on Enterprise Information Access, Consumption and Use. According to the data, 48% of executives believe it's acceptable to share information as long as it's not used for commercial purposes, and 45% believe digital or print paid information is fine to share.
Posted Jul 22, 2013
In light of Edward Snowden's recent disclosure that the NSA is keeping tabs on our every electronic move, it's hard not to think about privacy (or the lack thereof). While I often try to ignore it, sometimes it feels like science fiction movies (starring Tom Cruise...of course) about the watchful eye of the government are slowly becoming reality. That's when I begin worrying about the fabric of society. Shouldn't we all be worried about our privacy (especially if Tom Cruise isn't going to fix this problem)? Not surprisingly though, some of us worry more than others.
Posted Jul 04, 2013
A collaboration between different parts of the global creative industry, under the umbrella of the Linked Content Coalition (LCC), has resulted in the creation of a technical Framework to make it possible to manage and access online rights information across all types of media and content.
Posted Apr 08, 2013
John Wiley & Sons, Inc., announced that Journal of Cellular and Molecular Medicine and Microbial Biotechnology have joined the Wiley Open Access publishing program. All articles from these two journals are now open access and free to view, download, and share.
Posted Feb 19, 2013
Effective immediately De Gruyter and Versita will be publishing all Open Access content under the uniform application of Creative Commons license CC BY-NC-ND. This means that publications may be copied, disseminated, and otherwise made public with a few conditions.
Posted Feb 14, 2013