Learn more in the Directory!
Almost every website with a login page is under attack from bad bots, the automated programs used by hackers, fraudsters and competitors to carry out a variety of nefarious activities, according to a new report from Distil Networks, Inc.
Posted Mar 21, 2017
There is confusion over what qualifies as "the cloud," according to a new consumer survey. Despite indicating that they use at least one of several popular cloud-based applications, such as Google Drive, Dropbox, or Microsoft OneDrive, over 30% of consumers subsequently responded that they do not use or access information in the cloud. Clutch, a leading B2B ratings and reviews firm, designed the survey to gauge consumers' knowledge and habits regarding cloud usage.
Posted Feb 28, 2017
Blockchain is a distributed ledger system that uses a network consensus to record and execute transactions. It's best known as the platform for the web currency bitcoin, which is currently revolutionizing the financial services industry. However, blockchain has recently drawn wider attention as an increasing number of business leaders recognize that the underlying technology of this transformational architecture can be applied to almost any industry.
Posted Nov 21, 2016
Copyright Clearance Center, Inc. (CCC), creating global licensing and content solutions that make copyright work, announced the launch of RightFind Music, a search and file management website designed to help customers find, download, and manage music from APM Music's collection of more than 500,000 tracks licensed for use in presentations and video.
Posted Oct 20, 2016
Kaltura, a video technology provider, announced that it has received ISO/ICE 27001:2013, ISO 27799:2008 Certifications. The ISO/IEC 27001:2013 is an international standard specifying the requirements for an information security management system within an organization. ISO 27799:2008 specifically applies to information security management in healthcare. Implementing security controls for managing health information is a necessary requirement for compliance with privacy and data security standards and regulations, such as the United States' Health Insurance Portability and Accountability Act (HIPAA).
Posted Jul 28, 2016
Posted Jun 21, 2016
Distil Networks, Inc., a provider of bot detection and mitigation, published, "The 2016 Bad Bot Landscape Report: The Rise of Advanced Persistent Bots," an annual report that identifies statistically significant data on global bot traffic. Bad bots are used by competitors, hackers, and fraudsters and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, data theft, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.
Posted Mar 29, 2016
Siftsort.com announced that it has received a patent grant by the United States Patent and Trademark Office for their secure platform that helps people organize important documents and share them with family or trusted professionals. The USPTO published U.S. Patent No. 9,280,670 on March 8, 2016.
Posted Mar 29, 2016
3SI, a provider of delivery secure mobile communications projects, and CommuniTake Technologies, a provider of mobile security and management technology, have announced a multi-phased strategic OEM partnership to address governmental and business market requirements for highly secure wireless communications. The new partnership will fuse security concepts, technologies, platforms, and devices to generate a mobile cybersecurity solution.
Posted Mar 01, 2016
AdaptiveMobile, a provider of mobile network security, launched its Messaging App Security-a new product that enables messaging applications to secure their user base from increasing volume and sophistication of threats. Messaging applications - such as WhatsApp, Facebook Messenger, Viber and Kik - have experienced exponential growth over the past few years and are forecast to see a threefold increase in message traffic, from almost 31 trillion in 2014, to 100 trillion by 2019 globally.
Posted Jan 26, 2016
The Media Trust, a leader in monitoring and protecting the online and mobile advertising ecosystem, announced the release of Digital Threat Intelligence (DTI), a real-time threat intelligence feed consisting of information on actual malware attacking websites and internet users via compromised ad tags, and any third-party code used to render websites. DTI's intelligence is generated entirely from The Media Trust's own proprietary ad tag and website monitoring service, which scans and analyzes the website source code, ad tags, third-party domains and any external calls executing on the world's largest, most heavily trafficked digital properties for anomalous, suspicious, or malicious activity.
Posted Dec 03, 2015
Sierraware, a provider of virtualization and security, introduced VMI-in-a-Box, which allows small businesses to secure their mobile apps. This new, consolidated solution makes it easier for organizations to securely host mobile apps in the cloud and keep sensitive data off of mobile devices. VMI-in-a-Box simplifies the deployment of SierraVMI Virtual Mobile Infrastructure by providing an integrated and tested hardware appliance or a virtual appliance for KVM, Xen, and VMware ESX hypervisors.
Posted Dec 01, 2015
SDL announced that its management system, SDL WorldServer, has been granted ISO27001 certification by the International Organization for Standardization (ISO). This important designation assures SDL customers that their translation management applications were written and are supported with security in mind, whether their deployment is on premise or SaaS-based.
Posted Nov 03, 2015
DRM means different things to different people. In popular perception, DRM is often associated with controlling access to proprietary content--for instance, preventing music or video file-sharing. To be clear, this article is not about content protection technologies that prevent viewing or using digital assets. Instead, we take an enterprise perspective, and the focus here is on enterprise DRM tools to manage the rights and licensing information associated with digital assets.
Posted Oct 07, 2015
There's an unspoken agreement that consumers and companies enter into millions of times a day: Consumers get free products that they value (Facebook and Twitter), and the companies show them semi-personalized and relevant ads to pay for the service. But survey after survey shows that Americans value privacy but feel resigned to not having much when they venture online. Businesses live in fear of a data breach that would undermine the public’s trust in their company and cost them revenue and shareholder value.
Posted Oct 05, 2015
Consumer products like fitness trackers and smart thermostats are among the most easily identifiable "things" of the Internet of Things. But the IoT also has a buttoned-up side. Many enterprises are deploying sensor-packed devices that gather data and can communicate with other devices through the internet. Their benefits can be wide ranging, and they include the potential for improving decision-making capabilities and creating efficiencies through automation. There's a catch, though: These data-rich, connected technologies can pose security risks. Cybercriminals have their eyes on the IoT, too.
Posted Sep 18, 2015
Arxan Technologies, a provider of application protection solutions, announced the publication of its fourth annual "State Of Application Security Report," with new research on the ecosystem for pirated software and digital assets. Conducted by Arxan and iThreat Cyber Group (ICG), the report reveals that illegal reproduction and distribution of copyrighted material on the web is booming as a result of security breaches in both mobile and desktop software applications.
Posted Jul 07, 2015
The Media Trust, which monitors and protects the online and mobile advertising ecosystem, announced the release of Resolution Services, a SaaS-based service that provides real-time information sharing with upstream and downstream business partners about malicious ads detected in a client's own operation. Designed for publishers, ad networks, ad exchanges, demand platforms, and paid-content engines, Resolution Services' continuous, real-time information sharing compresses cycle times for malware detection, notification, and remediation from several days to seconds, drastically reducing infected tags' ability to harm site visitors and its brand reputation. By compressing this cycle, companies can speed incident remediation, protect revenue by ensuring ad tags stay active, and strengthen business relationships by improving intra-industry communication and cooperation.
Posted Apr 23, 2015
Kaltura, provider of video technology platforms, announced a Universal DRM (Digital Rights Management) solution, adding support for DASH and the Common Encryption (CENC) standard, which enables media companies, content rights owners, and OTT providers to stream premium content without needing to worry about which browser, device, or platform is being used. The solution also aims to reduce storage costs and integration fees. With Google and others moving to deprecate or disable existing content protection systems, and Google choosing to disable NPAPI (Netscape Plugin Application Programming Interface) support in the Chrome browser in April 2015, Kaltura's Modular DRM allows video service providers to transition without disrupting service.
Posted Apr 14, 2015
Absio Corporation (Absio), a cybersecurity and data control software development company, announced the release of a secure email application called Absio Dispatch. Absio Dispatch is an easy-to-use application, or plug-in to Microsoft Outlook, that automatically encrypts every email message and attachment, and maintains that encryption everywhere without changing the way people use email.
Posted Apr 07, 2015
KnowBe4 has announced the release of its automated Voicemail Phishing Security Test module, giving IT Managers the ability to test users on social engineering via the phone. As criminals have expanded their repertoire, moving into new territory with automated voicemail phishing (vishing) attacks, KnowBe4 has countered with a new module loaded with five Kevin Mitnick VST Scenarios that can be used to keep users on their toes with security top of mind.
Posted Sep 16, 2014
Digi-EXPress, LLC, a provider of global automated rights solutions, announces Digi-EXPress Rights Life-Cycle (RLC). It is an Automated e-Commerce System for acquiring, managing and selling licenses for company owned content and third party media content. These business transformation processes (protected by Digi's patent 8,438,113), are embedded within Digi-EXPress RLC Software a suite of cloud-based Global Automated Rights Solutions and 'best practice' business processes.
Posted Sep 11, 2014
Rightscorp, a provider of monetization services for artists and holders of copyrighted Intellectual Property (IP), announced that it plans to expand its copyright monetization services into the consumer book publishing market. Rightscorp will soon represent authors and publishing companies by monitoring and monetizing their digital assets against copyright infringement and illegal downloading.
Posted Apr 15, 2014
Sookasa, Inc., a provider of compliance for popular cloud applications and mobile devices, introduced Sookasa Cloud Compliance Service, a Compliance as a Service solution that simplifies the protection of sensitive files across popular cloud services and mobile devices. Sookasa enables professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA.
Posted Apr 10, 2014
Lumeta Corporation announced the addition of cloud and virtual machine (VM) versions of its Lumeta IPsonar and Lumeta Enterprise Situational Intelligence (ESI) network situational awareness solutions. With these new deployment capabilities, customers can take advantage of the convenience and quick implementation of a software-as-a-service (SaaS) delivery model, as well as benefit from a pay-as-you-go alternative to on-premises infrastructure. Additionally, because Lumeta ESI listens to and crawls physical or virtual networks in near-real time, ESI enables organizations to gain network situational awareness of their presence in private, public, and hybrid clouds.
Posted Mar 18, 2014