Success found by taking ideas that seemed like sound concepts and putt them into practice in a scalable way.
A new report from Bluebox Security says the top 10 travel apps in the iOS and Android app stores are all riddled with security flaws. Bluebox says encryption app data, insufficient protection against man-in-the-middle attacks, and leftover administration or debugging code are the biggest issues for the iPhone and Android devices.
- By Matt Holden
- Sep 15, 2015
Every level of government developing ways to deal with physical security as well as the data their program produce.
- By Scott Cheatham
- Sep 14, 2015
First effort to create uniform legal standards for federal authorities to track cellphones.
- By Ginger Hill
- Sep 14, 2015
The flaw could affect up to 200 million users.
- By Matt Holden
- Sep 09, 2015
A new report says some of the top baby monitors are vulnerable to basic hacking attempts.
- By Matt Holden
- Sep 02, 2015
Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.
- By Amit Cohen
- Sep 01, 2015
From data breaches to security system compromises, there’s a ‘cloud’ hanging over hosted environments, labeling them unsafe or subject to easy compromise.
- By Brian Matthews, Ralph Shillington
- Sep 01, 2015
Updates kiosk inspection protocol to ensure customer data safety.
Technology embedded into core of devices at factory and provides reliable two-way connection.
The ride service is significantly expanding its security team.
- By Matt Holden
- Aug 17, 2015
Collaboration supports and is designed to deliver seamless interoperability.
Partnership enables organizations to easily scan code and eliminate software risk.
Security market to see rise of opportunities in cloud data center security.
- By Ginger Hill
- Aug 12, 2015
Since 2010 high-ranking officials' vacation plans, emails to friends and other correspondence has been targeted by China.
- By Ginger Hill
- Aug 11, 2015
New partnership helps ensure data integrity and operational continuity if a cyber-incident occurs.
Small $30 device - Rolljam - enables entry into two of your most private places.
- By Ginger Hill
- Aug 10, 2015
Enables monitoring centers to leverage cloud services, including Video Verification, 24/7 Live Intervention, Virtual Guard, Virtual Escort, and Virtual Assistant.
To deliver agentless endpoint security to French market.
Provides common video interface for a wide range of vertical market applications.