Erstream integrates NexGuard’s watermarking solution into its OTT and CDN offering

Erstream has announced the integration of NexGuard forensic watermarking into its online video delivery platform.

Read more

Smartphones now account for 60% of infections in mobile networks, says Nokia malware report

Nokia Security Center Berlin, powered by Nokia Threat Intelligence Lab, has released research findings showing that in the mobile networks, smartphones pulled ahead of Windows(TM)-based computers and laptops, now accounting for

Read more

This is the year of connected security and software-based networks

This year will see dramatic change for mobile operators and Communications Services Providers (CSPs). This change will be driven by the continued rise of wearables, the Internet of Things (IoT),

Read more

Nokia aims to strengthen its security portfolio with planned purchase of Canada’s Nakina Systems

Mobile World Congress, Barcelona, Spain. February 22, 2016 — Nokia plans to acquire Canadian software firm Nakina Systems for an undisclosed sum to reinforce its position in security. The companies previously

Read more

Covertix announces complete data discovery and protection for Box, GoogleDrive, DropBox enterprise file sharing

Covertix, a provider of data-centric security solutions, reports that its SmartCipher™ suite now fully supports Enterprise File Sharing and Synching, which makes data accessible and shareable on web, mobile, cloud,

Read more

Key IT trends in enterprise mobility management

One of the most common customer complaints we heard in 2015 was the increasing lack of control they felt they had over their workers’ devices. End user computing today is

Read more

Xura partners with SMS PASSCODE making multi-factor authentication simple and secure for users

Xura, Inc. has announced its strategic partnership with SMS PASSCODE, a provider of adaptive multi-factor authentication. Xura complements SMS PASSCODE’s authentication suite by providing reliable and secure messaging connectivity world-wide, through

Read more

Biometrics: Physical attributes vs. behavioural patterns – the privacy debate

Account takeovers are increasingly affecting a growing population of online user accounts due to a confluence of threats, such as weak consumer password practices, frequent mass data breaches and brute

Read more

Deploy G.fast right or miss opportunity to bring CES’s technologies to the masses, says Broadband Forum

CES, Las Vegas, January 6, 2016 – Operators need to get G.fast right if they want to take advantage of the huge opportunity to enable and deliver up-and-coming technologies to

Read more

Huntsman Security introduces the first automated threat verification to dramatically reduce time-at-risk

Huntsman has introduced the first vendor agnostic machine learning-based Automated Threat Verification (ATV) technology.

Read more