authentication
Invisible authentication for mobile applications
RSA announced the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password (OTP) or risk-based …
Unified identity federation for cloud applications
SafeNet announced that its SafeWord 2008 strong authentication management platform, along with SafeNet Authentication Manager (SAM), now provides a seamless and extensible …
Android VPN client launches via fingerprint authentication
AuthenTec introduced a security solution that combines VPN client security with fingerprint recognition for Android smartphones and tablets. The QuickSec Mobile VPN Client 2.0 …
Stonesoft a2Cloud: Strong authentication for secure cloud access
Stonesoft announced its new a2Cloud solution which offers secure access to the cloud with usability, minimal administration and low total cost of ownership. a2Cloud delivers …
First enterprise mobile DLP solution
Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …
Strong security is just common sense
For many years those who concerned themselves with an organization’s cyber security warned of threats, both internal and external, urging organizations to adequately …
NFC-enabled BlackBerry smartphones will “open doors”
HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …
Enterprise-level management and control of SSL certificates
Managing Secure Sockets Layer (SSL) certificates is critically important for enterprises and is becoming a larger challenge, especially due to the skyrocketing number of …
NBC News Twitter account hijacked by using a Trojan?
On the very eve of the tenth anniversary of the September 11 attacks, the NBC News Twitter account begun posting messages saying that two civilian airplanes have been hijacked …
SecurityByte: Cyber conflicts, cloud computing and printer hacking
Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …
KillSwitch technology catches brute-force attacks
Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …
Entrust strengthens mobile security with device authentication
In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …
Featured news
Resources
Don't miss
- Preventing data leakage in low-node/no-code environments
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration
- Update your OpenWrt router! Security issue made supply chain attack possible
- Microsoft: “Hack” this LLM-powered service and get paid