News & Highlights Archive
News & Highlights
(Source: Sci-Tech Today) … does not guarantee security for their increasingly complex infrastructure, which can easily involve 10,000 end-user devices — roughly half of which are mobile …
Read More
News & Highlights
(Source: SPAMfighter News (press release)) Some more security vendors too identified the malicious software; however, they’ve categorized it to be one Trojan which incase run would try to pull
Read More
News & Highlights
(Source: HITInfrastructure.com) May 03, 2017 – Blue Cedar announced the release of its new enterprise mobilesecurity platform aimed at extending traditional enterprise mobility management …
Read More
News & Highlights
(Source: DABCC.com) Xen Project follows industry-accepted best practices regarding software security. This includes observing an embargo period, during which time the Xen Project …
Read More
News & Highlights
(Source: Yahoo Finance) Lepide, a provider of IT security and compliance solutions, picked Austin as it new global headquarters. Lepide, which also has offices in London and New Delhi …
Read More
News & Highlights
(Source: Yahoo Finance) Appdome, the mobile industry’s first cloud service that automates mobile app integration by fusing services such as security and mobility management to mobile …
Read More
News & Highlights
(Source: PR Web (press release)) A holistic approach to your entire online presence, JKL Web Technologies is one-stop shopping for online services, from performance and security testing to …
Read More
News & Highlights
(Source: IT Business Net) Essen, 3 May 2017 secunet Security Networks AG (ISIN DE0007276503, WKN 727650), a leading German supplier of high-quality, reliable IT security and an IT …
Read More
News & Highlights
(Source: InfoWorld) Project Sopris’ intended result is a mix of secure hardware and software that brings many of the trusted computing models used in Windows to IoT devices.
Read More
News & Highlights
(Source: The Eagle Online) ICT stakeholders gather in Lagos to proffer solution to cyber security threat … solving cyber-security challenges relating to forensics, web–security, cryptography, …
Read More