MetaCert protects companies of all sizes from phishing attacks when using mobile email and messaging app. Whether it's a mobile app or an loT device, if it communicates over http, the MetaCert Security API can add a thin but very powerful layer of security to help protect consumers from malicious attacks over the Internet. MetaCert's patent-pending Security API checks the reputation of http requests in real time, warning consumers of potential threats before allowing known malicious web pages (or other resources) from loading inside the app. MetaCert also offers a content-based filtering service for developers that want to block pornography inside their apps.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security

CYBLE LAUNCHES DEDICATED MANAGED SECURITY SERVICE PROVIDER (MSSP) PROGRAM TO EMPOWER INDUSTRY-LEADING MSSPS

Cyble | June 16, 2022

news image

Cyble, the Y Combinator-backed leader in AI-powered global cyber threat intelligence, is proud to announce its latest threat intelligence platform for the Managed Security Service Providers (MSSPs). Through the new program, Cyber MSSP partners can benefit from a comprehensive dashboard comprising advanced threat intelligence and cybercrime monitoring and mitigation. It will be instrumental in enabling both customers and partners to work in tandem towards achieving their cybersecurity goals.
Read More

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

news image

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More

PANDEMIC HAS UNLEASHED AN UNPRECEDENTED LEVEL OF RANSOMWARE ATTACKS ON HEALTHCARE

Healthcare Dive | July 03, 2020

news image

Ransomware hit at least 26 U.S. healthcare providers between January and May, according to Recorded Future, which used open-source reporting to verify the attacks.April and May averaged six ransomware attacks each, compared to five attacks in April and three attacks in May last year. Recorded Future confirmed Maze was responsible for at least six ransomware attacks this year and NetWalker was responsible for at least five.Since 2016, Recorded Future said it cataloged 161 publicly dis...

Read More

Network Threat Detection

SOLVO REINVENTS CLOUD IDENTITY AND ACCESS MANAGEMENT WITH IAMAGNIFIER

Solvo | November 30, 2021

news image

Solvo, a security automation enabler for cloud development and production environments", announced today the availability of its "IAMagnifier" – a cloud SaaS security platform, enabling developers, DevOps and cybersecurity stakeholders working in cloud development environments to reduce potential cybersecurity threats caused by misconfigured access permissions to cloud assets. To truly enable a secured, yet productive development environment, a "least-pri...

Read More
news image

Data Security

CYBLE LAUNCHES DEDICATED MANAGED SECURITY SERVICE PROVIDER (MSSP) PROGRAM TO EMPOWER INDUSTRY-LEADING MSSPS

Cyble | June 16, 2022

Cyble, the Y Combinator-backed leader in AI-powered global cyber threat intelligence, is proud to announce its latest threat intelligence platform for the Managed Security Service Providers (MSSPs). Through the new program, Cyber MSSP partners can benefit from a comprehensive dashboard comprising advanced threat intelligence and cybercrime monitoring and mitigation. It will be instrumental in enabling both customers and partners to work in tandem towards achieving their cybersecurity goals.
Read More

news image

IT SECURITY LEADERS ENGAGE IN RISKY SECURITY, PASSWORD HABITS

Helathitsecurity | February 25, 2020

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of usable security tools, according to a recent report from Yubico and conducted by the Ponemon Institute. Researchers surveyed 2,507 global IT and IT security leaders, as well as 563 individual users. They found that while most IT leaders have strong awareness of best practice authentication and password ...

Read More
news image

PANDEMIC HAS UNLEASHED AN UNPRECEDENTED LEVEL OF RANSOMWARE ATTACKS ON HEALTHCARE

Healthcare Dive | July 03, 2020

Ransomware hit at least 26 U.S. healthcare providers between January and May, according to Recorded Future, which used open-source reporting to verify the attacks.April and May averaged six ransomware attacks each, compared to five attacks in April and three attacks in May last year. Recorded Future confirmed Maze was responsible for at least six ransomware attacks this year and NetWalker was responsible for at least five.Since 2016, Recorded Future said it cataloged 161 publicly dis...

Read More
news image

Network Threat Detection

SOLVO REINVENTS CLOUD IDENTITY AND ACCESS MANAGEMENT WITH IAMAGNIFIER

Solvo | November 30, 2021

Solvo, a security automation enabler for cloud development and production environments", announced today the availability of its "IAMagnifier" – a cloud SaaS security platform, enabling developers, DevOps and cybersecurity stakeholders working in cloud development environments to reduce potential cybersecurity threats caused by misconfigured access permissions to cloud assets. To truly enable a secured, yet productive development environment, a "least-pri...

Read More