The sleek, black smartphone will allow users to make secure phone calls, video chat and store files securely.
Zero trust considers all network traffic, wherever it originates, as suspect. Every packet on the network has to be inspected and analyzed in real time.
Microsoft announced it will continue to provide updates to antimalware signatures for Windows XP users through July 14, 2015.
Forensic Toolkit 5.1 adds native investigative capability for Microsoft's Volume Shadow Copy and geolocation technologies
Dell Software recently announced new tools for mobility management, security and business intelligence.
Standardized SDP security framework will protect application infrastructures from network-based attacks.
New service brings increased security and access management for both employee-owned and corporate-issued devices.
Checking for unusual activity in log and event management data can help admins spot the changes that can compromise network security.
The iboss network monitoring console provides packet-level visibility across a network, helping curb conventional and advanced security threats.
PC maker Lenovo and Nok Nok Labs, a developer of online authentication systems, form a partnership to offer a standard approach to improving password security and ease of use.
Agencies should expect to see more authentication, increased use of private clouds and the spread of smart city technologies in 2014.
Madrid, Spain-based AGNITiO sees a place for voice biometrics in authenticating user ID on smartphones and other mobile devices.