Security

IDC: Smart MFPs must offer secure printing from mobile devices

New whitepaper sponsored by OKI Europe reveals three quarters of businesses have no document security in place, leaving them exposed to security threats

Egham, 23 February 2016 – Businesses in Europe have a critical need for ‘anytime and anywhere’ secure access to information to maintain and boost workplace productivity, a new IDC whitepaper sponsored by OKI Europe Ltd has revealed.

Latest Exploitation of SS7 Network – Next Generation of Mobile Tracking Attacks

AdaptiveMobile finds evidence of sophisticated location tracking platforms exploiting the SS7 network

DALLAS, 18 February 2016 – AdaptiveMobile, the world leader in mobile network security, announced today it has evidence of sophisticated location tracking platforms exploiting the SS7 network. In new research to be released at Mobile World Congress, 2016, AdaptiveMobile will share detailed evidence of next-generation location tracking platforms exploiting the SS7 network, using global tracking platforms to determine the near-exact location of specific subscribers.

Zylpha Supplies Frettens Solicitors With Adobe eSign

Legal Systems Innovator Zylpha (www.zylpha.com) is to supply Adobe’s eSign software to The Legal 500 recognized solicitor Frettens. The software will be used throughout the firm for initial paperwork and also in the property department to speed up the process of completing property forms. By using eSign, as opposed to post, Frettens hope to shorten the time taken to complete conveyancing transactions. The system will be integrated with the practice’s existing Visualfiles case management system to ensure seamless workflows and ease of use.

Are Industrial Control Systems the Latest Weapon in Modern Warfare?

Are industrial control and SCADA (Supervisory Control and Data Acquisition) systems the new frontier, not just for cyber-crime but also for cyberwar? Until recently, when you were at war with a country, you sent in your bombers. First they hit the military targets. Once they had finished those off, they would hit infrastructure, with attacks designed to destroy industry and demoralize the civilian population.

Ipswitch Survey Reveals IT Teams in a Battle for File Transfer Security

While a majority of IT professionals believe the secure sharing and transferring of files is very important, more than half are using unsecure cloud-file sharing services

LONDON, UK. – February 4, 2016 – Given the increase in threats and vulnerabilities introduced to the market on a daily basis, the process of moving company data securely is critical to the role of IT teams. Today, Ipswitch announced the findings of their new survey that evaluated the current file transfer solutions and policies in place for 555 IT professionals across the globe. The survey found that while IT teams believe secure file transfers are very important to their organisations, they lack the necessary tools to do so.

New Complete Cloud-Based Security Solution from iSheriff

iSheriff Complete replaces point products for Web, email and endpoint security

27 January 2016 – iSheriff, a leading cloud security company, today announced the release of iSheriff Complete, a comprehensive cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels. iSheriff Complete is the industry’s first comprehensive cloud security platform to provide fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies.

AdaptiveMobile expands product portfolio to secure multi-million user base on mobile messaging applications

New RESTful API enables the Company to bring carrier-grade security to messaging applications worldwide

DALLAS, January 26th, 2016 – AdaptiveMobile, the world leader in mobile network security, today launched its Messaging App Security – a new product that enables messaging applications to secure their user base from increasing volume and sophistication of threats.

Cyber Security Predictions for 2016: Heads Will Roll

UK cyber security innovator Glasswall Solutions sees data security rising to the top of the corporate agenda as organizations fail to cope with new threats and regulations

London UK, 21st January 2016: Glasswall Solutions, the acclaimed UK cyber security company, today issued its top five predictions for 2016.

The list covers the five key developments that Glasswall’s team of experts believes will have biggest impact on cyber security over the next 12 months.

“Businesses around the globe now face unprecedented threats from every kind of hacker and cyber criminal,” said Greg Sim, CEO, Glasswall Solutions.

NGINX Launches NGINX Plus Release 8

NGINX’s Application Delivery Platform Adds New OAuth Authentication and Improved Tools for a More Seamless User Experience

San Francisco – January 19, 2016 – NGINX, Inc., the engine delivering sites and applications for the modern web, today announced the availability of NGINX Plus R8, the latest release of its application delivery platform. The update provides even more features to improve the delivery and operation of complex and high-performance web applications.

CMS Report's Top 10 Content Management Stories of 2015

Welcome to the last article of 2015. I look back with amazement. This year, CMS Report published over 250 articles related to content management systems, content strategy, business strategy, and information technology. I'm forever grateful for the many authors that submitted their articles this past year for review and publication. 

So do you want to know which content management system articles were our most popular? Below are the top ten stories of 2015 that we posted here at CMSReport.com. The articles in this list are ranked based on the rate they were viewed since the article first appeared online.