While a majority of CEOs express strong confidence in the effectiveness of their current IT systems, most are struggling to close the innovation achievement gap to drive growth and revenue, according to a global study by Accenture. The is based…
Tag: Help Net Security
Email security industry miss rates when encountering threats are higher than 20%
Email security miss rates are definitely a huge issue. Malicious files regularly bypass all of today’s leading email security products, leaving enterprises vulnerable to email-based attacks including ransomware, phishing and data breaches, according to BitDam. BitDam conducted an empirical study…
State CIOs see innovation as critical priority, only 14% report extensive innovation
Most state CIOs see innovation as a major part of their job – 83% said innovation is an important or very important part of their day-to-day leadership responsibilities – while only 14% reported extensive innovation initiatives within their organizations, Accenture…
Download: State of Breach Protection 2020 survey results
What are the key considerations security decision makers should take into account when designing their 2020 breach protection? To answer this, Cynet polled 1,536 cybersecurity professionals to understand the common practices, prioritizations and preferences of organization today in protecting themselves…
Stellar Cyber’s new app applies machine learning to firewall data to spot anomalies
Security provider Stellar Cyber, with the first Open-XDR platform, announced its new Firewall Traffic Analysis (FTA) Application, which supercharges firewalls by analyzing their data to spot undetected anomalies. With this new App, security analysts get an automated assistant to detect…
FireEye Mandiant unveils two new services to help orgs improve detection, investigation, and response
FireEye, the intelligence-led security company, announced the availability of two new FireEye Mandiant services. Cloud Security Assessments help organizations evaluate and harden security in cloud platforms, and Cyber Defense Operations consulting services help organizations achieve security transformation by improving the…
STEALTHbits StealthRECOVER 1.5: Easier and faster AD rollback and recovery
STEALTHbits Technologies, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announced the release of StealthRECOVER 1.5, their fine-grained rollback and recovery solution for Active Directory (AD). As a…
Skylo raises $116M to bring affordable IoT connectivity to over 1 billion devices globally
Skylo, maker of the world’s most affordable and ubiquitous network that connects any machine or sensor, announced that the company has emerged from Stealth with $116 million in total funding. The company previously raised $13 million in a Series A…
Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects
ACROS Security has released a micropatch that implements the workaround for a recently revealed actively exploited zero-day RCE flaw affecting Internet Explorer (CVE-2020-0674). Remote code execution vulnerability affecting IE Last Friday, Microsoft released an out-of-band security advisory notifying Internet Explorer…
First patches for the Citrix ADC, Gateway RCE flaw released
As attackers continue to hit vulnerable Citrix (formerly Netscaler) ADC and Gateway installations, Citrix has released permanent fixes for some versions and has promised to provide them for other versions and for two older versions of SD-WAN WANOP by January…
Researchers create OT honeypot, attract exploits and fraud
Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. Hardware equipment that ran the factory Complex investigation The six-month investigation revealed that…
Mitsubishi Electric discloses data breach, possible data leak
Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that “personal information and corporate confidential information may have been leaked.” The company, though, claims that “sensitive information on social infrastructure such…
Data-driven vehicles: The next security challenge
Companies are increasingly building smart products that are tailored to know the individual user. In the automotive world, the next generation passenger vehicle could behave like a personal chauffeur, sentry and bodyguard rolled into one. Over the next decade, every…
Review: Enzoic for Active Directory
Seemingly every day news drops that a popular site with millions of users had been breached and its user database leaked online. Almost without fail, attackers try to use those leaked user credentials on other sites, making password stuffing one…
Techniques and strategies to overcome Kubernetes security challenges
Five security best practices for DevOps and development professionals managing Kubernetes deployments have been introduced by Portshift. Integrating these security measures into the early stages of the CI/CD pipeline will assist organizations in the detection of security issues earlier, allowing…
Revenue from cloud IT infrastructure products declines
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, declined in the third quarter of 2019 (3Q19) as the overall IT infrastructure market continues to experience weakening…
BakerHostetler’s multidisciplinary practice group helps clients leverage data and technology
Data is everything to businesses and organizations across the globe. For more than a decade, different teams at law firm BakerHostetler have been at the forefront of helping clients leverage data and technology to transform their products and services. Following…
Datadog expands support for channel partners with Partner Network
Datadog, the monitoring and analytics platform for developers, IT operations teams and business users in the cloud age, announced the Datadog Partner Network, a new program expanding Datadog’s support for channel partners. The Datadog Partner Network will bring benefits to…
Mellanox OpenStack software includes native upstream support for HDR 200 Gb InfiniBand network
Mellanox Technologies, a leading supplier of high-performance, end-to-end smart interconnect solutions for data center servers and storage systems, announced that OpenStack software includes native and upstream support for virtualization over HDR 200 gigabit InfiniBand network, enabling customers to build high-performance…
Synopsys joins Autonomous Vehicle Computing Consortium to deliver safer and affordable vehicles
Synopsys announced that it has joined the new Autonomous Vehicle Computing Consortium. The Consortium brings together leading experts in the automotive, automotive supply, semiconductor and computing industries to help accelerate the delivery of safer and affordable vehicles. As a member…
Anexsys partners with Brainspace to help clients solve complex data challenges
Anexsys, the leading UK consulting firm specialising in legal support and e-discovery is delighted to announce their new partnership with Brainspace, the world’s leading data analytics platform for investigations, eDiscovery, and compliance. Anexsys has integrated the Brainspace platform as part…
Quanergy Systems announces corporate changes to drive next phase of growth
Quanergy Systems, a leading provider of LiDAR (Light Detection and Ranging) sensors and perception software solutions, announced a number of important corporate changes to ensure successful execution in the company’s next phase of growth. The fast-growing global LiDAR market is…
WorldRemit appoints Scott Eddington to lead the Asia Pacific business
Leading mobile payments company WorldRemit has appointed seasoned digital executive Scott Eddington to lead the Asia Pacific business as it positions itself to help even more customers make secure, quick and affordable cross border payments. Scott will be responsible for…
Judi Dotson to lead Booz Allen Hamilton’s National Security business
Booz Allen Hamilton announced that Judi Dotson, an Executive Vice President, will lead the firm’s National Security business and join the firm’s Leadership Team, effective April 1. Throughout her 31 years at the firm, Dotson has developed market strategies, built…
A look at cybersecurity for rail systems, building automation and the future of critical infrastructure
Waterfall Security Solutions announced a major expansion into new markets and industry verticals. In support of this expansion, Waterfall has secured a significant new funding round to enable aggressive growth. We caught up with Lior Frenkel, CEO and co-founder of…
Waterfall Security Solutions secures significant new funding round
Waterfall Security Solutions, the OT security company, announced a major expansion into new markets and industry verticals. In support of this expansion, Waterfall has secured a significant new funding round to enable aggressive growth. Waterfall’s priorities for expansion are rail…
NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s privacy. To help organizations keep this balance, the National Institute of Standards and Technology (NIST) is offering…
Business units and IT teams can no longer function in silos
Over the next two years, 50% of organizations will experience increased collaboration between their business and IT teams, according to Gartner. The dispute between business and IT teams over the control of technology will lessen as both sides learn that…
Apria Healthcare leverages Absolute to protect patient data and ensure HIPAA compliance
To ensure the highest levels of endpoint security across more than 8,000 devices and to help achieve HIPAA compliance in the face of rising data breaches across the healthcare industry, Apria Healthcare leverages Absolute, the leader in endpoint resilience, for…
CyberArk’s new just-in-time access capabilities help reduce risk and improve operational efficiency
CyberArk, the global leader in privileged access management, unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies. By extending just-in-time support with the ability to remove unnecessary standing access…
Virsec partners with ProtectedIT to offer cybersecurity protections to its clients
Virsec, a cybersecurity company delivering a radically new approach to protect against advanced targeted attacks, announced it has partnered with ProtectedIT, a leader in delivering enterprise security solutions, remote infrastructure, and cloud services to offer advanced cybersecurity protections to its…
Fortanix announces record sales year, new partnerships and global expansion in 2019
Fortanix, the Runtime Encryption company, announced it had a record year in 2019, which saw sales climb 285 percent over the previous record year. Important new partnerships with Equinix, Google, IBM and Intel set the stage for both innovation and…
Skyview Capital acquires Fidelis Cybersecurity to expand portfolio and accelerate growth
Global private investment firm Skyview Capital has added to its software technology portfolio with the acquisition of Bethesda, MD-based Fidelis Cybersecurity from a consortium of investors in a stock transaction. Fidelis Cybersecurity is a leading provider of Network Traffic Analysis…
Security Compass secures funding to enhance solutions portfolio and accelerate growth
Security Compass, a leading provider of enterprise DevSecOps software solutions, announced it has secured growth equity funding from FTV Capital, a sector-focused growth equity investment firm. This investment will enable Security Compass to enhance its position as a global leader…
Bill Staples joins New Relic as chief product officer
New Relic, the industry’s largest and most comprehensive cloud-based observability platform built to help customers create more perfect software, announced that Bill Staples will join New Relic as chief product officer on February 14, 2020. Reporting directly to CEO and…
ISACA appoints Julia Kanouse as senior vice president of membership
Bringing a rich tech background and executive experience in the association sector, Julia Kanouse has joined ISACA’s leadership team as senior vice president of membership. ISACA has more than 145,000 members in 188 countries working in information and cyber security,…
Zscaler elects David Schneider to its Board of Directors
Zscaler, the leader in cloud security, announced that Zscaler stockholders elected David Schneider to its Board of Directors at the annual stockholder meeting held January 10, 2020. Schneider is President, Global Customer Operations at ServiceNow. Mr. Schneider’s term will expire…
Peter Leav joins McAfee as Chief Executive Officer
McAfee, the device-to-cloud cybersecurity company, announced that its Board of Managers has appointed Peter Leav to the role of Chief Executive Officer, effective February 3, 2020. Leav will succeed Chris Young, who has decided to step down as Chief Executive…
ioXt appoints Gregory Guez to its board of directors
ioXt, the global standard for IoT security and preeminent IoT security alliance, announces the appointment of Gregory Guez, Senior Director of Product Marketing, IoT Security at Silicon Labs, to its board of directors. As a founding member of the ioXt…
Resolve Systems promotes Vijay Kurkal to Chief Executive Officer
Resolve Systems, the leader in enterprise IT automation and AIOps, announced the promotion of Vijay Kurkal to Chief Executive Officer, effective immediately. Since joining the company as Chief Operating Officer in 2018, Kurkal has been instrumental in the company’s global…
Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound
Here’s an overview of some of last week’s most interesting news and articles: Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A vulnerability (CVE-2019-19494) in Broadcom‘s cable modem firmware can open unknown millions of broadband modems by…
Microsoft Application Inspector: Check open source components for unwanted features
Want to know what’s in an open source software component before you use it? Microsoft Application Inspector will tell you what it does and spots potentially unwanted features – or backdoors. About Microsoft Application Inspector “At Microsoft, our software engineers…
IoT cybersecurity’s worst kept secret
By improving access to data and taking advantage of them in fundamentally different ways to drive profitability, IT security executives are rapidly changing perceptions of their office. Although making better sense of and use of data may be standard fare…
New infosec products of the week: January 17, 2020
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications Masergy Shadow IT Discovery immediately scans and identifies all applications, providing clients visibility through the SD-WAN management portal. Until now, IT departments have had to rely on a variety of endpoint…
How to govern cybersecurity risk at the board level
Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security professionals. A report from University of California, Berkeley’s Center for Long-Term Cybersecurity (CLTC)…
Worldwide IT spending to total $3.9 trillion in 2020
Worldwide IT spending is projected to total $3.9 trillion in 2020, an increase of 3.4% from 2019, according to the latest forecast by Gartner. Global IT spending is expected to cross into $4 trillion territory next year. “Although political uncertainties…
Cloudflare for Campaigns protects political campaigns against cyberattacks and election interference
Cloudflare, the security, performance, and reliability company helping to build a better Internet, announced it will be offering free security services to help political campaigns in the United States and around the world defend against cyberattacks and election interference. The…
SecureLink simplifies vendors privileged access management for healthcare organizations
SecureLink, the leader in vendor privileged access management (VPAM), released SecureLink for Healthcare to provide hospitals and healthcare organizations a centralized solution for managing privileged access for third-party vendors. It is customized to meet the needs of organizations operating under…
DataVisor dEdge: Uncover known and unknown attacks early
DataVisor announced the availability of dEdge, an anti-fraud solution that detects malicious devices in real-time, empowering organizations to uncover known and unknown attacks early, and take action with confidence. Fraud detection today spans multiple vectors. With growing adoption of mobile…
CloudNine Collection Manager: Data extraction solution for Office 365 emails and OneDrive files
CloudNine launches CloudNine Collection Manager, a breakthrough data extraction solution from the global electronic discovery technology provider. Installed in minutes, Collection Manager defensibly performs native data collections from Office 365 (O365) email custodians, as well as Microsoft OneDrive cloud storage…
Micro Focus AD Bridge 2.0: Extending security policies and access controls to cloud-based Linux
Micro Focus released Micro Focus AD Bridge 2.0, offering IT administrators the ability to extend Active Directory (AD) controls from on-premises resources, including Windows and Linux devices to the cloud – a solution not previously offered in the marketplace. With…
52 hackers participate in ninth U.S. Department of Defense and HackerOne bug bounty program
Through partnership with the Defense Digital Service, the U.S. Department of Defense (DoD) and HackerOne, the number one hacker-powered pentesting and bug bounty platform, announced the results of the second Army bug bounty program, ‘Hack the Army 2.0’. The bug…
Visa invests in VGS to accelerate fintech innovation while advancing data security
Very Good Security (VGS), a leader in modern data security and custodianship, announced that it has received a strategic investment from Visa to expand access to VGS’ infrastructure-as-a-service for financial technology companies (fintechs) and large enterprises. Visa joins other notable…
Tricentis acquires SpecFlow to extend support for the open source community
Tricentis, the leader in continuous testing for DevOps, announced that it has acquired SpecFlow, the biggest and most trusted BDD solution for .NET developers around the world. SpecFlow’s pragmatic approach to specification-by-example has helped agile development teams improve collaboration with…
CyberLink integrates facial recognition engine into VIVOTEK’s IP surveillance solutions
VIVOTEK, the global leading IP surveillance solution provider, and CyberLink, a pioneer of AI and facial recognition technologies, announced they have entered into a strategic partnership, which will integrate CyberLink’s FaceMe AI facial recognition engine into VIVOTEK’s IP surveillance solutions.…
White Ops appoints Rhushabh ‘Rush’ Mehta as Sr. VP of Engineering
White Ops, the global leader in bot mitigation verifying the humanity of more than 1 trillion digital interactions per week, announced the appointment of Rhushabh ‘Rush’ Mehta, former Head of Foundational Technology at Audible, an Amazon Company, to White Ops…
Kathy Crusco joins Code42’s board of directors
Code42, the leader in insider threat detection and response, announced the appointment of Kathy Crusco to its board of directors. An enterprise software veteran, she currently serves on the board of directors at QAD, Poly (formerly Plantronics and Polycom), and…
Fugue open sources Regula to evaluate Terraform for security misconfigurations and compliance violations
Fugue has open sourced Regula, a tool that evaluates Terraform infrastructure-as-code for security misconfigurations and compliance violations prior to deployment. Regula rules are written in Rego, the open source policy language employed by the Open Policy Agent project and can…
Facebook users will be notified when their credentials are used for third-party app logins
Facebook will (finally!) explicitly tell users who use Facebook Login to log into third-party apps what information those apps are harvesting from their FB account. At the same time, users will be able to react quickly if someone managed to…
Elastic Cloud on Kubernetes 1.0 is now available
Elastic Cloud on Kubernetes (ECK) is moving out of beta and into general availability. As Elastic announced with the alpha release of ECK back in May 2019, the vision for ECK is to provide an official way to orchestrate Elasticsearch…
Embedding security, the right way
As organizations proceed to move their processes from the physical world into the digital, their risk profile changes, too – and this is not a time to take risks. By not including security into DevOps processes, organizations are exposing their…
Emotet remains the dark market leader for delivery-as-a-service
The vast majority of nationally sponsored cybersecurity incidents take the form of espionage through data exfiltration, with frequent employment of remote access tool Plug-X, according to the annual threat report by eSentire. Emotet is the leader The report found that…
Six trends attracting the attention of enterprise technology leaders
Organizations around the world will accelerate enterprise technology investment in 2020, leveraging digital improvements to make them more competitive, improve connections with consumers, and keep up with the increasing demands of privacy regulation and security needs. Hyland has identified six…
Global security services industry to experience spend growth of more than $80 billion
The global security services industry is poised to experience spend growth of more than $80 billion between 2019-2024 at a CAGR of over 8% during the forecast period, according to SpendEdge. Factors such as the increase in the instances of…
Tripwire introduces new line of hardware appliances and joins ISA Global Security Alliance
Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organizations, has announced the launch of the Tripwire Industrial Appliance line of hardware for securing industrial environments. In addition, Tripwire has announced that it has joined…
SS8 launches new virtualized end-to-end lawful intelligence platform for CSPs
SS8 Networks, the leader in Lawful Intercept and Monitoring Center platforms, is proud to announce the launch of its new virtualized end-to-end lawful intelligence platform to meet the demands of 5G data volumes and complex monitoring needs. SS8’s innovative cloud-based…
Osano automates data privacy for businesses
Osano, a company building the first platform for data privacy transparency, has automated the compliance process for the California Consumer Privacy Act (CCPA). A week into activation, the CCPA is already a notoriously contentious and dense set of laws. By…
Cygilant updates its SecureVue Cloud Platform, enhancing security monitoring and visibility
Cygilant, leading Cybersecurity Agency and provider of Security-as-a-Service to mid-sized organizations, highlighted recent additions to its SecureVue Cloud Platform. SecureVue Cloud enables clients to quickly gain comprehensive visibility into their cloud-based operations, making it easier to identify potential problems and…
Quanta Storage adopts SecureCircle’s DASB to eliminate insider threats
SecureCircle, the world’s first Data Access Security Broker (DASB), announced an agreement to eliminate insider threats such as accidental sharing and malicious users with Quanta Storage (QSI). QSI, a worldwide leader in OEM and ODM services to the world’s leading…
Dynatrace, Google and Microsoft collaborate to help make OpenTelemetry enterprise-grade
Software intelligence company, Dynatrace, announced it is collaborating with Google and Microsoft on the OpenTelemetry project to shape the future of open standards-based observability. To further advance the industry and extend the reach of its Software Intelligence Platform, Dynatrace is…
Evertech replaces its IP Address Management platform with FusionLayer Infinity
FusionLayer announced that Evertech has replaced its traditional IP Address Management (IPAM) platform with FusionLayer Infinity, the software-defined IPAM solution designed to simplify network automation for cloud-native service provider platforms utilizing containers. Evertech selected the FusionLayer solution to replace its…
Wind River acquires Star Lab to broaden portfolio with cyber and anti-tamper security software for Linux
Wind River, a leader in delivering software for the intelligent edge, announced its acquisition of Star Lab, a leader in cybersecurity for embedded systems. The acquisition broadens the comprehensive Wind River software portfolio with a system protection and anti-tamper toolset…
AttackIQ promotes Stacey Meyer to vice president of federal operations
AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced the promotion of Stacey Meyer to vice president of federal operations. “Stacey has proven to be an invaluable member of the AttackIQ team,” said Carl Wright, chief commercial…
James W. Sample joins Xcel Energy as vice president, Chief Security Officer
Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program, overseeing all aspects of security including cybersecurity, physical security and the safety of personnel.…
Software AG appoints Dr. Matthias Heiden as its new Chief Financial Officer
Software AG announced the appointment of Dr. Matthias Heiden as its new Chief Financial Officer (CFO). Dr. Heiden will be taking over from Arnd Zinnhardt, who will step down after 18 years in the role. Dr. Heiden will join Software…
iPipeline names Daphne Thomas as Chief Operating Officer
iPipeline – a leading provider of cloud-based software solutions for the life insurance and financial services industry – announced the appointment of Daphne Thomas to the role of Chief Operating Officer. The appointment comes several months after iPipeline was acquired…
High-risk Google account owners can now use their iPhone as a security key
Google users who opt for the Advanced Protection Program (APP) to secure their accounts are now able to use their iPhone as a security key. About Google’s Advanced Protection Program Google introduced the Advanced Protection Program in late 2017, to…
Kubernetes bug bounty program open to anyone, rewards up to $10,000
The Cloud Native Computing Foundation is inviting bug hunters to search for and report vulnerabilities affecting Kubernetes. Offered bug bounties range between $100 to $10,000. What is Kubernetes? Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and…
Companies increasingly reporting attacks attributed to foreign governments
More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions soaring In 2018, 19% of organizations believed they were attacked by a nation-state. That figure increased to 27%…
Cyber attackers turn to business disruption as primary attack objective
Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals. Another notable finding…
Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities
Information Technology spending by Department of Defense (DOD) and Intelligence Community (IC) agencies will continue to grow as they work to keep pace with the evolution of both the threat landscape and technology development, according to Deltek. Intelligence community The…
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications
Masergy launched its Masergy Shadow IT Discovery solution. Shadow IT Discovery exposes enterprises to significant cybersecurity risks. Building on its mission to make security intrinsic to its SD-WAN platform and to offer the most robust real-time visibility and control, Masergy…
Cynerio offers hospitals free Windows 7 risk assessment
To prepare for the transition into Windows 7 End of Life, Cynerio is offering hospitals a complementary risk assessment until February 14, 2020. Connected medical devices are the weakest link in healthcare security and the prevalence of devices running on…
GTT expands portfolio with Fortinet’s FortiGate Secure SD-WAN solution
GTT Communications, a leading global cloud networking provider to multinational clients, announced it has expanded its SD-WAN service offering by adding Fortinet Secure SD-WAN as a technology option. GTT delivers Fortinet Secure SD-WAN as a managed service and supports any…
STEALTHbits StealthINTERCEPT 7.0 strengthens enterprise passwords and AD security
STEALTHbits released StealthINTERCEPT 7.0, their real-time Active Directory (AD) policy enforcement solution that audits and blocks unwanted and unauthorized changes, authentications, and queries within the world’s most complex AD infrastructures. With 95 million AD accounts attacked daily and 56% of…
Citrix Analytics for Performance: Identifying performance issues at the individual user level
In the old days, analyzing system performance was all about monitoring speeds and feeds. Today, understanding the user experience (UX) is critical. And to help companies do this, Citrix Systems announced the launch of Citrix Analytics for Performance, a next-generation…
Perfect Sense unveils Gyro to simplify cloud infrastructure management
Perfect Sense, which leverages its Brightspot publishing platform to drive innovations in web and mobile development, launched Gyro – a powerful cloud management tool that mitigates the risks associated with manually provisioning and managing infrastructure, lack of standards in configurations,…
Paysafe and Handpoint enable SaaS-based ISVs to capture card-present payments
Paysafe, a leading specialized payments platform, has expanded its omni-channel payments offering through the launch of the Cloud SDK from Handpoint, a pioneer in defining integrated payments. Complementing the existing Handpoint APIs and SDKs used by Paysafe clients with Android,…
Neustar launches UltraThreat Feeds, a service providing near real-time threat data
Neustar, a global information services company and leader in identity resolution, announced the release of UltraThreat Feeds, a new service that provides its enterprise customers with access to real-time threat data to help them better identify cyber threats as they…
Temenos Infinity: Giving banks the ability to create AI-driven customer experiences
Temenos, the banking software company, announced that it has delivered new industry first Banking Distribution Services as part of the award-winning Temenos Infinity digital front-office banking product. Temenos Infinity is the first core-agnostic product to give banks the ability to…
ManageEngine Applications Manager now supports Oracle Autonomous Database
ManageEngine, the IT management division of Zoho Corporation, announced that Applications Manager, its server, cloud, and application performance monitoring solution, now supports Oracle Autonomous Database. This move enables enterprise IT operations teams and cloud database administrators (DBAs) to gain visibility…
Entisys360 purchases PTP’s cybersecurity technology and support solutions assets
Entisys360, an award-winning IT consultancy specializing in the deployment and delivery of advanced IT infrastructure, virtualization, security, automation and cloud first solutions, announced that is has purchased Performance Technology Partner’s (PTP) cybersecurity technology and support solutions assets. Inclusive of security…
Samsung acquires TeleWorld Solutions to accelerate and simplify rollouts of 5G networks
Samsung announced the completion of an agreement to acquire TeleWorld Solutions (TWS), a network services provider headquartered in Chantilly, VA. TWS provides network design, testing and optimization services to mobile service and cable operators, equipment OEMs and other companies across…
NortonLifeLock announces purchase of ID Analytics by LexisNexis Risk Solutions
NortonLifeLock, a global leader in consumer cyber safety, announced LexisNexis Risk Solutions, part of RELX, has entered into an agreement to acquire ID Analytics (IDA), a trusted provider of credit and fraud risk solutions for enterprises, for a purchase price…
Trusona raises $20M to meet growing demand and accelerate innovations
Trusona, the leader in passwordless multi-factor authentication technology, announced that it has secured $20 million in additional financing led by growth equity firm Georgian Partners. Prior investors including Kleiner Perkins, M12, OurCrowd and Seven Peaks Ventures also participated in the…
January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSA
As forecasted, January 2020 Patch Tuesday releases by Microsoft and Adobe are pretty light: the “star of the show” is CVE-2020-0601, a Windows flaw flagged by the NSA that could allow attackers to successfully spoof code-signing certificates and use them…
Security pitfalls to avoid when programming using an API
OWASP’s API Security Project has released the first edition of its top 10 list of API security risks. The most common and perilous API security risks API abuse is an ongoing problem and is expected to escalate in the coming…
2020 forecast: Attackers will target non-traditional systems
While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. Containers, connected devices and the communications between the two technologies will be a primary focus…
A 101 guide to mobile device management
Extending beyond the traditional company network, mobile connectivity has become an extension of doing business and IT staff need to not just rethink how existing activities, operations, and business models can fit into mobile constructs, but rethink how mobility can…
Fraud prevents a third of businesses from expanding digital capabilities
Kount released a new research report on digital innovation and emerging fraud, which found that the most innovative businesses are also the ones facing the greatest fraud threats. The report, conducted by Javelin Research, surveyed hundreds of respondents across the…