The Latest in IT Security

Posts Tagged ‘Applications’

Tripwire announced at RSA Conference 2015 that its Tripwire IP360 solution now discovers more than 100,000 conditions, including vulnerabilities, configurations and operating systems, and more than 15,000 applications. Tripwire solutions ensure that assets on customer networks are accurately and comprehensively profiled, evaluated for vulnerabilities and evaluated for compliant configurations. The company provides broad coverage of conditions […]

Read more ...

At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart device for securely accessing corporate #applications and #data. Dr. Bernard Parsons, CEO of Becryptm said: “Because it is managed centrally, it ensures […]

Read more ...

While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, external collaborators and third-party apps are dramatically increasing the threat surface for new cloud cyberattacks. CloudLock examined more than 750 million files, 77,500 apps and six million users in the cloud. […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments