Univa, a leading innovator of enterprise-grade workload management and optimization solutions, announced the general availability of Navops Launch 2.0, its flagship cloud-automation platform, designed to help enterprises simplify the migration of HPC and AI workloads to their choice of cloud.…
Tag: Help Net Security
Concentric launches with a deep learning approach to fixing broken file permissions
Concentric announced the availability of a new approach to the most significant security challenge facing the enterprise today – business-critical unstructured data, stored on-premises or in the cloud, that is impossible to identify and protect manually. Enterprise customers using Concentric…
Fusion Risk Management unveils Fusion Connector for Everbridge Risk Intelligence
Fusion Risk Management, a leading provider of business continuity and risk management software and services, announced the launch of its Fusion Connector for Everbridge Risk Intelligence – powered by NC4, further extending its long-time partnership with Everbridge, the global leader…
ThreatStack partners with Tevora to streamline cloud security and compliance initiatives
Threat Stack, the leader in cloud security and compliance for infrastructure and applications, announced a partnership with Tevora, a specialized management consultancy focused on cybersecurity, risk, and compliance services. Together Threat Stack and Tevora will help customers seamlessly migrate and…
ServiceNow acquires Passage AI to advance deep learning AI capabilities
ServiceNow, the company making work, work better for people, announced it has signed an agreement to acquire Passage AI, a Mountain View, Calif.-based conversational AI platform company. The transaction will advance ServiceNow’s deep learning AI capabilities and will accelerate its…
Arceo appoints Mike Convertino as CSO
Mike Convertino, the former CISO of Twitter, Crowdstrike and F5 Networks as well as CTO of the Security Product Group at F5, has joined Arceo as Chief Security Officer and he is on a mission. Mike, and a growing tribe…
Omnitracs to further support the work of Truckers Against Trafficking
Omnitracs, the global pioneer of fleet management solutions to transportation and logistics companies, announced an event dedicated to supporting the mission of Truckers Against Trafficking (TAT), a non-profit organization that educates, equips and empowers truck drivers to recognize and report…
O’Reilly and Formulatedby announce new conference about smart cities and mobility industries
O’Reilly, the premier source for insight-driven learning on technology and business, and Formulatedby announced a new conference focused on how machine learning is transforming the future of urban communities and mobility industries around the world. Rapid technological advancements are challenging…
Daniel Kollberg joins SentinelOne as VP of EMEA
SentinelOne, the autonomous endpoint protection company, announced the appointment of Daniel Kollberg as Vice President EMEA. The appointment supports SentinelOne’s record growth across the globe on the journey of becoming the next great cybersecurity company, through helping organizations use AI…
UN hacked: Attackers got in via SharePoint vulnerability
In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the…
Photos: Cybertech Global Tel Aviv 2020
Cybertech Global Tel Aviv is one of the largest B2B networking events in the cyber industry, outside of the United States. Every year, the event attracts thousands of attendees, mainly C-level executives, investors, professionals, and government officials from all over…
Photos: Cybertech Tel Aviv 2020
Cybertech Tel Aviv is one of the largest B2B networking events in the cyber industry, outside of the United States. Every year, the event attracts thousands of attendees, mainly C-level executives, investors, professionals, and government officials from all over the…
Magento patches critical code execution vulnerabilities, upgrade ASAP!
Adobe-owned Magento has plugged multiple critical vulnerabilities in its eponymous content management system, the most severe of which could be exploited by attackers to achieve arbitrary code execution. About the fixed vulnerabilities According to the newest Magento-themed security bulletin (now…
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to remediate. It’s enough to make you throw your hands up and wonder where to…
Organizational culture defines a successful cloud strategy
61% of organizations in the U.S. and Canada are committed to moving enterprise applications to the cloud as quickly as possible, but many struggle with challenges related to company culture on the way to a successful cloud strategy, NTT DATA…
How industries are evolving their DevOps and security practices
There’s significant variation in DevOps maturation and security integration across the financial services, government, retail, telecom, and technology industries, according to Puppet’s report based on nearly 3,000 responses. “Integrating security into your DevOps practices can be challenging, but when done…
Privacy ROI: Benefits from data privacy averaging 2.7 times the investment
Customer demands for increased data protection and privacy, the ongoing threat of data breaches and misuse by both unauthorized and authorized users, and preparation for the GDPR and similar laws around the globe spurred many organizations to make considerable privacy…
Tech pros should consider modern APM tools to gain insight across the entire application stack
While application performance management (APM) has become mainstream with a majority of tech pros using APM tools regularly, there’s work to be done to move beyond troubleshooting, according to SolarWinds. The opportunity for tech pros lies in fully leveraging the…
PCI Pal Digital offers security for payments across digital engagement channels
PCI Pal, the secure payments provider, announced the launch of PCI Pal Digital. Combined with its existing Agent Assist and IVR payment solutions, PCI Pal Digital will enable a true omnichannel secure payments environment for contact centers and businesses taking…
RiskSense Ransomware Dashboard automatically reveals an org’s exposure to specific attacks
RiskSense, pioneering risk-based vulnerability management and prioritization, announced an industry first – a Ransomware Dashboard that automatically reveals an organization’s exposure to specific attacks including the ransomware family name, vulnerabilities they exploit, the assets at risk and remediation steps to…
SIOS AppKeeper: Automatically responding to service outages on Amazon EC2 instances
SIOS Technology, an industry pioneer in providing IT resilience through intelligent application availability, announced the availability of SIOS AppKeeper, the industry’s first out-of-the-box solution to automatically respond to service outages on Amazon EC2 instances, protecting applications from service interruptions and…
Fastly Cloud Optimizer brings real-time control and visibility to multi-cloud and multi-CDN architectures
Fastly, provider of an edge cloud platform, announced Cloud Optimizer, a new offering that enables critical, high-traffic content delivery by sitting between a company’s content delivery network (CDN) and its central cloud. Cloud Optimizer brings customers with multi-cloud or multi-CDN…
Apstra AOS 3.2 simplifies the management of data center networks
Apstra, the leader in Intent-Based Networking for the data center announces the latest product release, Apstra AOS 3.2, to empower IT with increased control and flexibility of their data center network operations without increasing budget or adding resources. Apstra AOS…
ControlUp v8.1: Native integration with VMware Horizon and enhanced scalability
ControlUp, a technology company at the forefront of self-driven IT management and monitoring solutions, has announced the general availability of ControlUp v8.1. ControlUp v8.1 delivers native integration with VMware Horizon and enhanced scalability, enabling end user computing (EUC) admins to…
Tripwire partners with Eaton to strengthen security for energy utilities
Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organizations has announced a technology partnership with power management company Eaton. With this partnership, Tripwire and Eaton are making it easier and faster for U.S. utilities…
AppOmni raises $10M to accelerate sales and marketing operations
AppOmni, provider of a Software-as-a-Service (SaaS) security and management platform, announced that it has raised $10 million in Series A funding led by ClearSky. New investor Inner Loop Capital also participated in the round, joining existing investors Costanoa Ventures, Silicon…
Critical RCE flaw in OpenSMTPD, patch available
Qualys researchers have discovered a critical vulnerability (CVE-2020-7247) in OpenBSD’s OpenSMTPD mail server, which can allow attackers to execute arbitrary shell commands on the underlying system as root. “We developed a simple proof of concept and successfully tested it against…
Most AV vendors will continue to support their products under Windows 7
Earlier this month, Windows 7 – the most beloved Windows version up to date – has reached end-of-support. Businesses of all sizes can still pay to receive extended security updates (ESUs) to keep their systems secure while they plan their…
Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more!
Offensive Security have released Kali Linux 2020.1, which is available for immediate download. Kali Linux 2020.1 key new features The popular open source project, which is heavily relied upon in the pentest community, is introducing several new features, including new…
2019 saw more data breaches, fewer sensitive records exposed
According to a new Identity Theft Resource Center report, the number of U.S. data breaches tracked in 2019 (1,473) increased 17 percent from the total number of breaches reported in 2018 (1,257). However, 2019 saw 164,683,455 sensitive records exposed, a…
2020: A year of deepfakes and deep deception
Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging cyber threat. The first examples of deepfakes seen by the general…
RSA Conference announces finalists for Innovation Sandbox Contest 2020
RSA Conference announced the 10 finalists for its Innovation Sandbox Contest 2020. The competition calls on the most promising young companies in cybersecurity to showcase their transformative technologies to a panel of judges and live audience at RSA Conference 2020…
Are businesses prepared for an extinction-level cyber event?
In an era of technological transformation and cyber everywhere, the attack surface is exponentially growing as cyber criminals attack operational systems and backup capabilities simultaneously in highly sophisticated ways leading to enterprise-wide destructive cyberattacks, a Deloitte survey reveals. Majority of…
50% of people would exercise at least one right under the CCPA
As state houses and Congress rush to consider new consumer privacy legislation in 2020, Americans expect more control over their personal information online, and are concerned with how businesses use the data collected about them, a DataGrail research reveals. In…
Cisco launches IoT security architecture to deliver enhanced visibility across IoT and OT environments
Networks have become the foundational backbone for the operational technology (OT) that underpins critical infrastructure including energy, transportation, and manufacturing. Organizations increasingly require real-time access into the data these systems hold to improve production, manage costs, and enhance safety metrics.…
Semtech LoRa Smart Home: A device for LPWAN-based smart home, community and consumer apps
Semtech, a leading supplier of analog and mixed-signal semiconductors and advanced algorithms, announced the launch of LoRa Smart Home, a device designed for LPWAN based smart home, community and consumer applications. The transceiver provides low power, broad coverage for indoor…
Magnet Forensics unveils new solution that simplifies remote forensics investigations
Magnet Forensics, the global leader in digital investigation software, is proud to announce the official release of their newest product: Magnet AXIOM Cyber. AXIOM Cyber is an innovative new solution purpose-built for organizations that need to perform remote acquisitions as…
Kindite unveils beta version to protect data even when leaked
Kindite, a Tel-Aviv based cybersecurity company that creates Zero-Trust Environments to protect data in the cloud, has launched a beta version allowing IT and security teams to have a new level of control over their cloud environment. Kindite allows encryption…
Cisco’s three developments to transform customer experience with contact centers
The world’s best brands earn customer loyalty over years, even decades – only to lose it in a few seconds if the customer experience is not stellar. While customer needs and expectations have changed, the ways in which companies respond…
F5’s NGINX Controller enhanced with configuration API, self-service, and app-centric capabilities
F5 Networks introduced NGINX Controller 3.0, a cloud-native application delivery solution to help organizations increase business agility, mitigate risk, and enhance their customers’ digital experiences. Built to unleash productivity and efficiency, the 3.x series offers the first multi-cloud, self-service platform…
Cisco adds AI-powered voice intelligence capabilities to Webex Meetings
Would you like to have better, more engaged meetings? Cisco announced innovations to do just that—using only your voice. Cisco is introducing new AI-powered voice intelligence capabilities to Webex Meetings to help turn talk into action. The Cisco Webex Assistant…
Cequence CQ botDefense now available on AWS Marketplace as a SaaS
Cequence Security announced that its Application Security Platform (ASP) with CQ botDefense is now available as a Software-as-a-Service (SaaS) offering hosted on Amazon Web Services (AWS). The solution allows customers to protect public-facing applications from online fraud caused by automated…
ADVA’s FSP 3000 and FSP 150 platforms to play pivotal role in the OPENQKD project
ADVA announced that its FSP 3000 and FSP 150 platforms will play a pivotal role in the OPENQKD project. Leveraging its ConnectGuard technology, ADVA will provide optical and Ethernet encryptors as well as open line systems for multiple testbed locations.…
Björn Lidefelt joins HID Global as CEO
HID Global, a worldwide leader in trusted identity solutions, announces Björn Lidefelt has been named President and CEO. Björn joins the company after serving as Chief Commercial Officer (CCO) at HID parent company ASSA ABLOY, where he oversaw branding, communications,…
Trustmark appoints Britt Lindley as its new CISO
Trustmark Mutual Holding Company, a national employee benefits provider, has selected Britt Lindley as its new Chief Information Security Officer (CISO). Bradley Bodell, Chief Information Officer, made the announcement. “Britt’s deep breadth of leadership experience, his proven track record of…
Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks following the initial attack, Travelex struggled to bring its customer-facing systems back online. Worse still, despite Travelex’s assurances…
How to detect and prevent issues with vulnerable LoRaWAN networks
IOActive researchers found that the LoRaWAN protocol – which is used across the globe to transmit data to and from IoT devices in smart cities, Industrial IoT, smart homes, smart utilities, vehicle tracking and healthcare – has a host of…
Security risks for e-scooters and riders exposed
Micromobility vehicles, such as e-scooters, zip in and out of traffic. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion. However, a research out of UTSA finds e-scooters have risks beyond the perils of…
52% of companies use cloud services that have experienced a breach
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud with sensitive data While these companies approve an average of 41 cloud services…
Benefits of blockchain pilot programs for risk management planning
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept (POC) or pilot stage, according to Gartner. One of the main reasons for this development is that early blockchain pilots for supply chain pursued technology-oriented models that…
Security Compass enables CSPs to set up and develop their FedRAMP initiatives
Security Compass, a software security company that provides organizations with technology to make software secure, has introduced feature enhancements to SD Elements that enable cloud service providers (CSPs) to set up and develop their Federal Risk and Authorization Management Program…
Cisco’s first Cybersecurity Co-Innovation Center in Europe opens in Milan
Cisco‘s first Cybersecurity Co-Innovation Center in Europe opened its doors in Milan at the Leonardo da Vinci Science and Technology Museum. The center was inaugurated in the presence of Paola Pisano, Minister for Technological Innovation and Digitization; Roberto Baldoni, Deputy…
Cybraics partners with AVANT to expand reach of its AI-backed threat detection services
Cybersecurity and analytics firm Cybraics announced a partnership with AVANT, an IT decision-making platform for next-generation technologies, further expanding the reach of the company’s artificial intelligence-backed threat detection services. “We are excited to partner with AVANT to offer our advanced…
Alfresco and Tech Mahindra collaborate on four jointly-developed insurance solutions
Alfresco Software, an open source content, process and governance software company, and Tech Mahindra, a leading provider of digital transformation, consulting and re-engineering services and solutions, announced collaboration on four jointly-developed, transformative insurance solutions. The collaboration combines Tech Mahindra’s insurance…
Cymatic selects security experts for advisory roles
Cymatic announced the launch of its advisory board, a community of international security and risk experts providing brand counsel, technical guidance, and market leadership to ensure the success and relevance of the Cymatic next-generation all-in-one web application defense platform. Cymatic…
SecureLink announces distribution partnership with ShiftLeft for GCC and Egypt
SecureLink, a risk advisory firm based in Dubai and part of the StarLink group, the region’s “True” Value-Added-Distributor (VAD), announced signing a distribution partnership with ShiftLeft for GCC and Egypt. ShiftLeft is the fastest and most accurate application security testing…
Sixgill appoints Meira Primes as chief marketing officer
Sixgill, a leading threat intelligence company, has appointed Meira Primes, a veteran strategist and marketer, as chief marketing officer. The appointment comes as Sixgill announced it is moving into larger offices to support growth as the company continues to capitalize…
SoftServe attains Data Analytics Specialization in Google Cloud Premier Partner Program
SoftServe, a leading digital authority and consulting company, has achieved the Data Analytics Specialization in the Google Cloud Premier Partner Program. This Partner Specialization affirms that SoftServe has demonstrated success turning large amounts of data into insights using Google Cloud…
Recommendations for navigating the dynamic cybercrime landscape
In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-fast paced threat environment. How has the cybersecurity threat landscape evolved in the past 5 years?…
You can upgrade Windows 7 for free! Why wouldn’t you?
“Doomsday is here! The sky is falling! Windows 7 is out of support and all hell will break loose!” – or, at least, that’s what some cybersecurity experts and press outlets want you to think. In this article, I will…
Patients believe stronger privacy protections are more important than easier health data access
Patients and consumers deserve better access to personalized, actionable health care information to empower them to make better, more informed decisions – but it should not drive up health care costs or compromise the privacy of their personal health data,…
Top 10 policy trends to watch for globally in 2020
The 10 top trends that will drive the most significant technological upheavals this year have been identified by Access Partnership. “Shifts in tech policy will disrupt life for everyone. While some governments try to leverage the benefits of 5G, artificial…
Grandstream launches two new additions to its GWN series of Wi-Fi Access Points
Grandstream, connecting the world since 2002 with award-winning unified communication solutions, announced the release of the two newest additions to their GWN series of Wi-Fi Access Points. The new GWN7602 is a 2×2 802.11ac Wi-Fi AP with an integrated Ethernet…
Swimlane version 10.0: Reducing mean time to detect and response for security incidents
Swimlane, an independent leader in security orchestration, automation and response (SOAR), announced the release of Swimlane version 10.0. The newest release has yielded up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search…
Fugue’s engineer empowerment and education as growth strategy in 2020
Fugue, the company empowering engineers to build and operate secure cloud systems, cites product innovation, growing awareness of cloud misconfiguration risk, and the engineer-led movement to address cloud security with engineering solutions as its primary drivers for growth in 2019.…
Adaptiva expands executive team in preparation for upcoming product launches
Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced strong financial results for 2019 along with significant expansion of its executive team in preparation for upcoming product launches and rapid growth in 2020, multiple…
CloudKnox Security raises $12M to accelerate customer growth and innovation
CloudKnox Security, a leader in identity authorization for hybrid and multi-cloud environments, announced that it closed $12M in a new round of funding. Led by Sorenson Ventures with participation from early investors, including ClearSky Security, Dell Technologies Capital and Foundation…
White Ops appoints Dr. Russell Handorf to Principal Threat Intelligence Hacker
White Ops, the global leader in bot mitigation, verifying the humanity of more than 1 trillion digital interactions per week, announced the appointment of Dr. Russell Handorf, former Computer Scientist with the FBI, to Principal Threat Intelligence Hacker. In his…
Week in review: Kubernetes security challenges, NIST Privacy Framework, Mitsubishi Electric breach
Here’s an overview of some of last week’s most interesting news and articles: Mitsubishi Electric discloses data breach, possible data leak Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that…
MDhex vulnerabilities open GE Healthcare patient monitoring devices to attackers
Researchers have discovered six critical and high-risk vulnerabilities – collectively dubbed MDhex – affecting a number of patient monitoring devices manufactured by GE Healthcare. The flaws may, according to GE Healthcare, allow an attacker to make changes at the device’s…
Lessons from Microsoft’s 250 million data record exposure
Microsoft has one of the best security teams and capabilities of any organization in the technology industry, yet it accidentally exposed 250 million customer records in December 2019. The data was accessible to anyone with a browser, who knew the…
CISOs: Make 2020 the year you focus on third-party cyber risk
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this challenge. If there is one work-related New Year’s resolution I’d like CISOs to…
Over half of organizations were successfully phished in 2019
Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. Seventy-eight percent also reported that security awareness training activities resulted in…
More authentication and identity tech needed with fraud expected to increase
The proliferation of real-time payments platforms, including person-to-person (P2P) transfers and mobile payment platforms across Asia Pacific, has increased fraud losses for the majority of banks. FICO recently conducted a survey with banks in the region and found that 4…
BigID launches Discovery-In-Depth technology to provide orgs with visibility into PI and sensitive data
BigID, the leader in personal data privacy and protection, announced their Discovery-In-Depth technology to provide organizations with unprecedented visibility and insight into personal and crown jewel data. The new technology builds on BigID’s patented Correlation technology for finding any Personal…
Citrix Systems and FireEye introduce new tool for detection of compromise
Citrix Systems and FireEye announced the launch of a new tool for detection of compromise in connection with the previously announced CVE-2019-19781 vulnerability, which affects certain versions of Citrix Application Delivery Controller (ADC), Citrix Gateway, and two older versions of…
Ixia adds new ML features in the Hawkeye active network monitoring platform
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced the addition of new machine learning (ML) features in the Hawkeye active network monitoring platform from Ixia, a…
HiveIO updates Hive Fabric with added data protection, backup to the cloud, and app insights
HiveIO announced version 8.0 of Hive Fabric, an intelligent virtualization solution that provides high-performing, scalable technology that removes complexity in the data center and delivers a seamless IT experience. The new version provides protection for virtual machines (VMs) and user…
Bank-Verlag signs up for 3-D Secure authentication solution from Entersekt and Netcetera
Entersekt described the latest implementations of its authentication technology in Europe’s DACH region. The fintech firm announced that Netcetera, a payments technology specialist and long-standing regional partner, has implemented the system for Bank-Verlag, which builds and operates secure digital services…
Mastercard and The Rockefeller Foundation unveil new platform for data science partnerships
The Mastercard Center for Inclusive Growth and The Rockefeller Foundation announced data.org as a platform for partnerships that will continue to build the field of data science for social impact. This is the next chapter of a $50 million commitment…
DISA awards Intelligent Waves with the global satellite communications contract
Intelligent Waves, an end-to-end information technology government solutions provider, announced that it was awarded a competitive, single award indefinite-delivery/indefinite-quantity (IDIQ) contract with the Defense Information Systems Agency (DISA). The contract called Enhanced Mobile Satellite Services (EMSS) Global Logistical Services Management…
Syniverse and AiRXOS to provide a communications infrastructure that manages drones
Technology innovators Syniverse and AiRXOS, a wholly owned subsidiary of GE Aviation, announced they are working together to protect the skies by providing a communications infrastructure that manages drones and other unmanned aerial vehicles operating at low altitudes. The collaboration…
Moody’s acquires RDC to expand its range of data solutions
RDC, the global leader in risk intelligence compliance screening, announced it has entered into a definitive agreement to be acquired by Moody’s Corporation. The RDC acquisition positions Moody’s Analytics’ Bureau van Dijk (BvD), a leading provider of business intelligence and…
STACK INFRASTRUCTURE and Peterson Companies to develop a data center campus in Manassas, VA
STACK INFRASTRUCTURE, the data center company built from the ground up to address the technology infrastructure needs of rapidly scaling enterprises and hyperscale businesses, and Peterson Companies, one of the largest privately-owned real estate development companies in the DC region,…
Kristen Robinson joins Splunk as Chief People Officer
Splunk, provider of the Data-to-Everything Platform, announced it has appointed Kristen Robinson as the company’s first Chief People Officer. Robinson, who will play a critical role in accelerating Splunk’s continued transformation journey, has more than 25 years of experience pioneering…
Onapsis appoints Dave DeWalt as Vice Chairman to its board of directors
Onapsis, the leader in business application protection, announced the appointment of Dave DeWalt as Vice Chairman to its board of directors. The strategic addition to the Onapsis board immediately follows the company closing a record year of progress, highlighted by…
IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781
Citrix and FireEye have teamed up to provide sysadmins with an IoC scanner that shows whether a Citrix ADC, Gateway or SD-WAN WANOP appliance has been compromised via CVE-2019-19781. Finding evidence of compromise By now it should be widely known…
It’s time to patch your Cisco security solutions again
Cisco has released another batch of security updates and patches for a variety of its offerings, including many of its security solutions. Security fixes for security solutions Among the security holes plugged is CVE-2019-16028, a critical authentication bypass vulnerability affecting…
Cybercriminals using fake job listings to steal money, info from applicants
Be extra careful when looking for a job online, the Internet Crime Complaint Center (IC3) warns: cybercriminals are using fake job listings to trick applicants into sharing their personal and financial information, as well as into sending them substantial sums…
Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One common misconception: Zero Trust is all about access controls and additional authentication, such…
There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for the training process, but the derived system is also provided with…
CIOs using AI to bridge gap between IT resources and cloud complexity
There’s a widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems, a Dynatrace survey of 800 CIOs reveals. IT leaders around the world are concerned about their ability to support…
NETSCOUT delivers DDoS visibility and protection for service providers and large enterprises
NETSCOUT, a market leader in service assurance, security, and business analytics, announced Arbor Sightline with Sentinel to deliver the next generation of DDoS visibility and protection for service providers and large enterprises. Combining core ARBOR NETWORKS and NETSCOUT Layer 7…
GoSecure adds Insider Threat Detection and Response to its portfolio
GoSecure, a leading provider of Managed Detection and Response (MDR) services and a predictive Endpoint Detection and Response (EDR) platform, announced the addition of Insider Threat Detection and Response to their portfolio. Insider incidents caused by malicious insiders, or where…
Privafy unveils cloud-native, security-as-a-service application to protect Data-in-Motion
Privafy unveiled a fundamentally new approach to data security that protects organizations against modern Data-in-Motion threats while disrupting the cost associated with complex, archaic network solutions. The company’s cloud-native application will secure Data-in-Motion as it moves across locations, clouds, mobile…
OneLogin launches Trusted Experience Platform, a complete IAM solution for enterprises
OneLogin introduced the Trusted Experience Platform, an identity foundation that enables companies to provide secure, scalable and smart experiences. The platform is a complete identity and access management (IAM) solution that leverages OneLogin’s investment and expertise in AI, seamlessly managing…
buguroo enhances its bugFraud solution with New Account Fraud prevention capabilities
buguroo, the online fraud prevention solutions specialist for the financial sector, unveiled further capabilities that make it easier for banks to identify fraudsters attempting to open new bank accounts. These enhanced New Account Fraud prevention capabilities – included in the…
RiskRecon joins with Mastercard to help customers achieve good third-party risk outcomes
RiskRecon, the world’s leading platform for easily understanding and acting on third-party cyber risk, and now a Mastercard company, announces its continued commitment to enabling the success of its customers in achieving good third-party risk outcomes, built on a foundation…
Axio joins the Cyber Readiness Institute to help orgs become more resilient and cyber ready
The Cyber Readiness Institute (CRI) is excited to welcome Axio, a leading cyber risk management SaaS company, to its Champion network. In collaboration with Axio, CRI Champions, members and users will now have access to a free tool, offered by…
Zenuity chooses HPE to develop next generation autonomous driving systems
Hewlett Packard Enterprise (HPE) has been selected by Zenuity, a leading developer of software for self-driving and assisted driving cars, to provide the crucial artificial intelligence (AI) and high-performance computing (HPC) infrastructure it needs in order to develop next generation…