Help Net Security
End-to-end desktop virtualization for government organizations
Dell launched its Desktop Virtualization Solutions for Government (DVS-Gov), a secure solution that helps government agencies manage “geographic sprawl” through …
92% of the top 100 mobile apps have been hacked
Ninety-two percent of the Top 100 paid Apple iOS apps and 100 percent of Top 100 paid Android apps have been hacked, according to a new report by Arxan Technologies. They …
SailPoint updates identity management solution IdentityIQ
SailPoint announced the release of IdentityIQ 6.0, an enterprise-grade identity management solution that scales to support thousands of business users at a single time. New …
Secure hardware storage encryption from SafeNet
SafeNet extends its comprehensive portfolio of data security solutions into the storage security market with StorageSecure, a NAS security solution developed in partnership …
From identity and access solutions to access governance
The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …
Military-grade encryption for Android devices
AuthenTec introduced a new security offering that provides military-grade encryption to data stored on Android smartphones and tablets. MatrixDAR helps bring Android devices …
OkayFreedom: VPN solution for private surfing
Steganos Software announced OkayFreedom, a VPN service enabling Internet users to privately and securely surf all Web content, regardless of their location. Designed for …
Developing and Hosting Applications on the Cloud
In this book, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on …
Week in review: Shamoon attacks, automated hacking, Assange granted asylum in Ecuador
Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos and articles: Scientists create algorithm for tracking down sources of …
Provisioning is not access governance
Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …
Fluke Networks adds remote analyzer capability to wireless LAN tools
Fluke Networks announced a new remote analysis capability for its portable WLAN tools, making them the first to enable both real-time troubleshooting and spectrum analysis of …
Programming Computer Vision with Python
If you want a basic understanding of computer vision’s underlying theory and algorithms, this hands-on introduction is the ideal place to start. You’ll learn …