Miller Kaplan, a top-100 certified public accounting firm, is pleased to announce that effective January 1, 2020, the firm has acquired Citadel Information Group – a Los Angeles-based company dedicated to providing information security management services to businesses and the…
Category: Help Net Security
Aliaswire names Jed Rice as CEO
Aliaswire, a leader in innovative cloud-based payments technology, announced that Jed Rice has been named CEO and been appointed to its Board of Directors, effective January 20. Rice joins the Aliaswire team as the company enters a new phase of…
Deepak Ahuja joins NetApp’s Board of Directors
NetApp announced that Deepak Ahuja, CFO of Verily, has joined its Board of Directors. Mr. Ahuja’s appointment brings the number of directors on the NetApp board to eight, seven of whom are independent. “I am pleased to welcome Deepak to…
LexisNexis Risk Solutions enhances its fraud and identity offering with the acquisition of Emailage
LexisNexis Risk Solutions, part of RELX, announced it has entered into an agreement to acquire Emailage, a global provider of fraud prevention and risk management solutions. Emailage will become a part of the Business Services group of LexisNexis Risk Solutions.…
Network Data Systems promotes Wayne Dumas to COO and Craig Johnson to VP of Worldwide Sales
Network Data Systems (NDS), an industry leader in IT infrastructure service solutions, is excited to announce the recent promotions of Wayne Dumas to COO and Craig Johnson to Vice President of Worldwide Sales. Wayne Dumas has been a member of…
Elastic App Search: Complete search solution with relevance tuning and analytics built in
Elastic, the company behind Elasticsearch and the Elastic Stack, announced the general availability of Elastic App Search on Elasticsearch Service. Elastic App Search is a ready-to-use, fully complete search solution with user-friendly relevance tuning and analytics built in. And starting…
New ransomware targets industrial control systems
With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various security outfits have been analyzing EKANS (aka Snake) since it emerged in…
State-sponsored actors may have abused Twitter API to de-anonymize users
A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to phone numbers and potentially de-anonymize certain users. How did it…
How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff that CISOs’ nightmares are made of. As devastating as such incidents can be, for the short…
What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping cyberattacks and finding and fixing breaches fast enough to lower the impact, according to a report from Accenture.…
Scientists test forensic methods to acquire data from damaged mobile phones
Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the evidence anyway. Now, researchers at the National Institute of Standards and Technology…
Automation is advancing faster than the enterprise knowledge required to support it
Automation is transforming the enterprise around the globe, directly impacting the bottom line as a result of improved productivity and efficiency, according to UiPath. But automation’s impact on the workplace is not well understood and cannot be ignored: automation raises…
Zyxel launches ZyWALL VPN1000 VPN Firewall, an all-in-one security solution for SMBs
Zyxel Communications, a leading provider of secure broadband networking, Internet access and connected home products, announced the launch of the ZyWALL VPN1000 VPN Firewall, an all-in-one security solution for small and medium businesses. The flagship of the growing Zyxel family…
Trend Micro and Baker Hughes collaborate to help deliver protection for critical infrastructure
Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry…
Wuhan coronavirus exploited to deliver malware, phishing, hoaxes
The Wuhan coronavirus continues to spread and create anxiety across the globe, allowing malicious individuals and groups to exploit the situation to spread fake news, malware and phishing emails. Malicious coronavirus-themed campaings IBM X-Force says that Japanese users have been…
Layering diverse defenses is crucial for stopping email attacks
Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the complete answer to the malicious email problem. At the same time, security awareness and…
Three principles regarding encryption you need to keep in mind
Encryption is a popular topic among security professionals and occasionally a polarizing one. Plenty of misconceptions surround the process, and these often skew the way people perceive its complexity. For instance, we’ve encountered many IT and business leaders who assume…
The current landscape for supporting innovation in cybersecurity in the EU
Innovation in cybersecurity is a key enabler to facilitate progress in the NIS industry, boost employment in the cybersecurity sector and growth of EU GDP. ENISA published a report that analyses the current landscape for supporting innovation in cybersecurity in…
Interconnectivity and networking predictions for 2020 and beyond
Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges of on-demand compute and storage, the migration of enterprise workloads across multiple cloud services, the imminence of 5G and…
Do your employees feel valued? 64% have one foot out the door
The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies…
Now available: eSentire’s 2019 Annual Threat Intelligence Report
Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as practical recommendations for readers seeking to understand and better respond to the cybersecurity threat landscape. By shining…
DigiCert launches two new PKI tools to provide fast, flexible PKI deployment
DigiCert announced two new PKI tools: IoT Device Manager and Enterprise PKI Manager. Unlike PKI applications of the past, both PKI managers use a container-based, cloud-agnostic implementation that ensures fast and flexible on-premises, cloud and hybrid PKI deployments. These new…
Absolute is strengthening endpoint resilience for its customers
Absolute, the leader in endpoint resilience, announced the company is extending the power of its Resilience solution and patented Persistence technology to a growing ecosystem of leading endpoint security applications. Leveraging its firmware-embedded capabilities in more than 500 million endpoint…
Imply 3.2: Deploy and manage the Imply platform on private and public cloud services
Imply, the real-time intelligence company, announced general availability of Imply 3.2, which leverages the power and flexibility of Docker containers and Kubernetes orchestration to help enterprises easily deploy and manage the Imply platform on private and public cloud services, including…
Login VSI adds app load testing to its continuous desktop and app testing platform
Login VSI, the company dedicated to maximizing the end-user experience, announced the general availability of Login Enterprise 4.0 (formerly called Login PI). This release adds application load testing to its continuous desktop and application testing platform. Login VSI increases the…
Delta Risk and CrowdStrike help clients strengthen their cyber security posture to detect and prevent attacks
Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has joined the CrowdStrike Elevate Partner Program. Delta Risk will offer CrowdStrike’s industry-leading next-generation endpoint protection platform, threat intelligence, and response services to help customers stop breaches.…
Radiflow and Fraunhofer develop ML and AI methods for industrial cybersecurity
Radiflow, a leading provider of cybersecurity solutions for industrial automation networks, and the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation (Fraunhofer IOSB), a prominent research institute for applied science in Germany, announced the launch of a joint research…
QinetiQ sells entire Quantum Key Distribution patent portfolio to Qubitekk
Quantum communication pioneer, Qubitekk, further strengthened its patent portfolio around Quantum Key Distribution technology. QinetiQ, a British multinational defense technology company, has signed an agreement to sell its entire Quantum Key Distribution (QKD) patent portfolio to Qubitekk. The portfolio includes…
Aquant raises $30M to support growth, drive AI innovation, and accelerate global expansion
Aquant, the leading service intelligence platform, announced the close of a $30 million Series B funding round. This latest round of funding was led by Insight Partners with participation from existing investors including Lightspeed Venture Partners, Angular Ventures, and Silvertech…
eSentire appoints Charles “C.J.” Spallitta as Chief Product Officer
eSentire, the global leader in cloud-delivered Managed Detection and Response (MDR), announced the appointment of Charles “C.J.” Spallitta as the company’s new Chief Product Officer, effective immediately. Spallitta will be responsible for eSentire’s entire product portfolio including vision, strategy and…
Patrick Bruce-Lockhart joins Softchoice as Vice President of Sales
Softchoice, a leading North American provider of IT solutions and managed services, announced the appointment of Patrick Bruce-Lockhart, a seasoned technology leader, as a Vice President in its Sales organization. He will report to Kevin Hendrick, Senior Vice-President, Sales. Bruce-Lockhart…
Week in review: UN hacked, new Kali Linux release, Win7 upgrade dilemma
Here’s an overview of some of last week’s most interesting news and articles: Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more! Offensive Security have released Kali Linux 2020.1, which is available for immediate download. Most AV vendors…
Make your own security key with Google’s OpenSK
Google has open-sourced OpenSK, firmware that, combined with an affordable chip dongle, allows you to make your own security key to use for authentication purposes. About OpenSK OpenSK isan open-source implementation for security keys that supports both FIDO U2F and…
Microsoft invites gamers and researchers to new Xbox bug bounty program
Gamers, security researchers, and technologists have been invited to identify security vulnerabilities in Xbox network and services and report them to Microsoft. Bounty rewards will range from $500 to $20,000 USD. Why? Microsoft runs a number of bug bounty programs…
New infosec products of the week: January 31, 2020
Swimlane 10.0: Reducing mean time to detect and response for security incidents The newest release has yielded up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search query response and display rates. Both…
80% of successful breaches are from zero-day exploits
Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or…
Secure 5G networks: EU toolbox of risk mitigating measures
EU Member States have identified risks and vulnerabilities at national level and published a joint EU risk assessment. Through the toolbox, the Member States are committing to move forward in a joint manner based on an objective assessment of identified…
93% of attempted mobile transactions in 2019 were fraudulent
93 percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released by Upstream. The number of malicious apps discovered in 2019 rose…
Researchers develop new optical stealth encryption technology
The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission, has been introduced by BGN Technologies. Time is running out on security and privacy “Today, information…
Kanguru Remote Management Console: Managing and monitoring encrypted USB devices
Managing sensitive data in today’s environment can be a daunting task for IT Security Administrators and organizations. Kanguru Remote Management Console (KRMC) offers a robust solution for IT Security Admins looking to meet high-end security demands by allowing administrators to…
Slice Labs’ new services help insurers protect carriers, businesses, and consumers from risk
Slice Labs, the first on-demand insurance platform, announced four new AI-powered Slice Mind services enabling insurers to more proactively and intelligently protect carriers, businesses, and consumers from risk. Industry prediction It represents the first commercialized approach in the insurance industry…
myDevices’ new panic button technology eliminates the dead zone problem
In 2018, the American Hotel & Lodging Association (AHLA) announced a new workplace safety initiative designed to provide emergency communications and location-based services for employees in the hospitality industry. Backed by major hotels – including Marriott International, InterContinental, Hilton, and…
Semtech releases LoRa-based Asset Tracking Reference Kit
Semtech, a leading supplier of high performance analog and mixed-signal semiconductors and advanced algorithms, announced the release of its Asset Tracking Reference Kit to accelerate the adoption of asset tracking solutions based on LoRa devices and the LoRaWAN protocol, and…
Keysight’s new PROPSIM channel emulator verifies radio links critical for aerospace applications
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced a new PROPSIM channel emulation solution that enables the aerospace industry to efficiently verify radio links critical to…
Univa Navops Launch 2.0 helps enterprises easily extend HPC workloads to the cloud
Univa, a leading innovator of enterprise-grade workload management and optimization solutions, announced the general availability of Navops Launch 2.0, its flagship cloud-automation platform, designed to help enterprises simplify the migration of HPC and AI workloads to their choice of cloud.…
Concentric launches with a deep learning approach to fixing broken file permissions
Concentric announced the availability of a new approach to the most significant security challenge facing the enterprise today – business-critical unstructured data, stored on-premises or in the cloud, that is impossible to identify and protect manually. Enterprise customers using Concentric…
Fusion Risk Management unveils Fusion Connector for Everbridge Risk Intelligence
Fusion Risk Management, a leading provider of business continuity and risk management software and services, announced the launch of its Fusion Connector for Everbridge Risk Intelligence – powered by NC4, further extending its long-time partnership with Everbridge, the global leader…
ThreatStack partners with Tevora to streamline cloud security and compliance initiatives
Threat Stack, the leader in cloud security and compliance for infrastructure and applications, announced a partnership with Tevora, a specialized management consultancy focused on cybersecurity, risk, and compliance services. Together Threat Stack and Tevora will help customers seamlessly migrate and…
ServiceNow acquires Passage AI to advance deep learning AI capabilities
ServiceNow, the company making work, work better for people, announced it has signed an agreement to acquire Passage AI, a Mountain View, Calif.-based conversational AI platform company. The transaction will advance ServiceNow’s deep learning AI capabilities and will accelerate its…
Arceo appoints Mike Convertino as CSO
Mike Convertino, the former CISO of Twitter, Crowdstrike and F5 Networks as well as CTO of the Security Product Group at F5, has joined Arceo as Chief Security Officer and he is on a mission. Mike, and a growing tribe…
Omnitracs to further support the work of Truckers Against Trafficking
Omnitracs, the global pioneer of fleet management solutions to transportation and logistics companies, announced an event dedicated to supporting the mission of Truckers Against Trafficking (TAT), a non-profit organization that educates, equips and empowers truck drivers to recognize and report…
O’Reilly and Formulatedby announce new conference about smart cities and mobility industries
O’Reilly, the premier source for insight-driven learning on technology and business, and Formulatedby announced a new conference focused on how machine learning is transforming the future of urban communities and mobility industries around the world. Rapid technological advancements are challenging…
Daniel Kollberg joins SentinelOne as VP of EMEA
SentinelOne, the autonomous endpoint protection company, announced the appointment of Daniel Kollberg as Vice President EMEA. The appointment supports SentinelOne’s record growth across the globe on the journey of becoming the next great cybersecurity company, through helping organizations use AI…
UN hacked: Attackers got in via SharePoint vulnerability
In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the…
Photos: Cybertech Global Tel Aviv 2020
Cybertech Global Tel Aviv is one of the largest B2B networking events in the cyber industry, outside of the United States. Every year, the event attracts thousands of attendees, mainly C-level executives, investors, professionals, and government officials from all over…
Photos: Cybertech Tel Aviv 2020
Cybertech Tel Aviv is one of the largest B2B networking events in the cyber industry, outside of the United States. Every year, the event attracts thousands of attendees, mainly C-level executives, investors, professionals, and government officials from all over the…
Magento patches critical code execution vulnerabilities, upgrade ASAP!
Adobe-owned Magento has plugged multiple critical vulnerabilities in its eponymous content management system, the most severe of which could be exploited by attackers to achieve arbitrary code execution. About the fixed vulnerabilities According to the newest Magento-themed security bulletin (now…
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to remediate. It’s enough to make you throw your hands up and wonder where to…
Organizational culture defines a successful cloud strategy
61% of organizations in the U.S. and Canada are committed to moving enterprise applications to the cloud as quickly as possible, but many struggle with challenges related to company culture on the way to a successful cloud strategy, NTT DATA…
How industries are evolving their DevOps and security practices
There’s significant variation in DevOps maturation and security integration across the financial services, government, retail, telecom, and technology industries, according to Puppet’s report based on nearly 3,000 responses. “Integrating security into your DevOps practices can be challenging, but when done…
Privacy ROI: Benefits from data privacy averaging 2.7 times the investment
Customer demands for increased data protection and privacy, the ongoing threat of data breaches and misuse by both unauthorized and authorized users, and preparation for the GDPR and similar laws around the globe spurred many organizations to make considerable privacy…
Tech pros should consider modern APM tools to gain insight across the entire application stack
While application performance management (APM) has become mainstream with a majority of tech pros using APM tools regularly, there’s work to be done to move beyond troubleshooting, according to SolarWinds. The opportunity for tech pros lies in fully leveraging the…
PCI Pal Digital offers security for payments across digital engagement channels
PCI Pal, the secure payments provider, announced the launch of PCI Pal Digital. Combined with its existing Agent Assist and IVR payment solutions, PCI Pal Digital will enable a true omnichannel secure payments environment for contact centers and businesses taking…
RiskSense Ransomware Dashboard automatically reveals an org’s exposure to specific attacks
RiskSense, pioneering risk-based vulnerability management and prioritization, announced an industry first – a Ransomware Dashboard that automatically reveals an organization’s exposure to specific attacks including the ransomware family name, vulnerabilities they exploit, the assets at risk and remediation steps to…
SIOS AppKeeper: Automatically responding to service outages on Amazon EC2 instances
SIOS Technology, an industry pioneer in providing IT resilience through intelligent application availability, announced the availability of SIOS AppKeeper, the industry’s first out-of-the-box solution to automatically respond to service outages on Amazon EC2 instances, protecting applications from service interruptions and…
Fastly Cloud Optimizer brings real-time control and visibility to multi-cloud and multi-CDN architectures
Fastly, provider of an edge cloud platform, announced Cloud Optimizer, a new offering that enables critical, high-traffic content delivery by sitting between a company’s content delivery network (CDN) and its central cloud. Cloud Optimizer brings customers with multi-cloud or multi-CDN…
Apstra AOS 3.2 simplifies the management of data center networks
Apstra, the leader in Intent-Based Networking for the data center announces the latest product release, Apstra AOS 3.2, to empower IT with increased control and flexibility of their data center network operations without increasing budget or adding resources. Apstra AOS…
ControlUp v8.1: Native integration with VMware Horizon and enhanced scalability
ControlUp, a technology company at the forefront of self-driven IT management and monitoring solutions, has announced the general availability of ControlUp v8.1. ControlUp v8.1 delivers native integration with VMware Horizon and enhanced scalability, enabling end user computing (EUC) admins to…
Tripwire partners with Eaton to strengthen security for energy utilities
Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organizations has announced a technology partnership with power management company Eaton. With this partnership, Tripwire and Eaton are making it easier and faster for U.S. utilities…
AppOmni raises $10M to accelerate sales and marketing operations
AppOmni, provider of a Software-as-a-Service (SaaS) security and management platform, announced that it has raised $10 million in Series A funding led by ClearSky. New investor Inner Loop Capital also participated in the round, joining existing investors Costanoa Ventures, Silicon…
Critical RCE flaw in OpenSMTPD, patch available
Qualys researchers have discovered a critical vulnerability (CVE-2020-7247) in OpenBSD’s OpenSMTPD mail server, which can allow attackers to execute arbitrary shell commands on the underlying system as root. “We developed a simple proof of concept and successfully tested it against…
Most AV vendors will continue to support their products under Windows 7
Earlier this month, Windows 7 – the most beloved Windows version up to date – has reached end-of-support. Businesses of all sizes can still pay to receive extended security updates (ESUs) to keep their systems secure while they plan their…
Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more!
Offensive Security have released Kali Linux 2020.1, which is available for immediate download. Kali Linux 2020.1 key new features The popular open source project, which is heavily relied upon in the pentest community, is introducing several new features, including new…
2019 saw more data breaches, fewer sensitive records exposed
According to a new Identity Theft Resource Center report, the number of U.S. data breaches tracked in 2019 (1,473) increased 17 percent from the total number of breaches reported in 2018 (1,257). However, 2019 saw 164,683,455 sensitive records exposed, a…
2020: A year of deepfakes and deep deception
Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging cyber threat. The first examples of deepfakes seen by the general…
RSA Conference announces finalists for Innovation Sandbox Contest 2020
RSA Conference announced the 10 finalists for its Innovation Sandbox Contest 2020. The competition calls on the most promising young companies in cybersecurity to showcase their transformative technologies to a panel of judges and live audience at RSA Conference 2020…
Are businesses prepared for an extinction-level cyber event?
In an era of technological transformation and cyber everywhere, the attack surface is exponentially growing as cyber criminals attack operational systems and backup capabilities simultaneously in highly sophisticated ways leading to enterprise-wide destructive cyberattacks, a Deloitte survey reveals. Majority of…
50% of people would exercise at least one right under the CCPA
As state houses and Congress rush to consider new consumer privacy legislation in 2020, Americans expect more control over their personal information online, and are concerned with how businesses use the data collected about them, a DataGrail research reveals. In…
Cisco launches IoT security architecture to deliver enhanced visibility across IoT and OT environments
Networks have become the foundational backbone for the operational technology (OT) that underpins critical infrastructure including energy, transportation, and manufacturing. Organizations increasingly require real-time access into the data these systems hold to improve production, manage costs, and enhance safety metrics.…
Semtech LoRa Smart Home: A device for LPWAN-based smart home, community and consumer apps
Semtech, a leading supplier of analog and mixed-signal semiconductors and advanced algorithms, announced the launch of LoRa Smart Home, a device designed for LPWAN based smart home, community and consumer applications. The transceiver provides low power, broad coverage for indoor…
Magnet Forensics unveils new solution that simplifies remote forensics investigations
Magnet Forensics, the global leader in digital investigation software, is proud to announce the official release of their newest product: Magnet AXIOM Cyber. AXIOM Cyber is an innovative new solution purpose-built for organizations that need to perform remote acquisitions as…
Kindite unveils beta version to protect data even when leaked
Kindite, a Tel-Aviv based cybersecurity company that creates Zero-Trust Environments to protect data in the cloud, has launched a beta version allowing IT and security teams to have a new level of control over their cloud environment. Kindite allows encryption…
Cisco’s three developments to transform customer experience with contact centers
The world’s best brands earn customer loyalty over years, even decades – only to lose it in a few seconds if the customer experience is not stellar. While customer needs and expectations have changed, the ways in which companies respond…
F5’s NGINX Controller enhanced with configuration API, self-service, and app-centric capabilities
F5 Networks introduced NGINX Controller 3.0, a cloud-native application delivery solution to help organizations increase business agility, mitigate risk, and enhance their customers’ digital experiences. Built to unleash productivity and efficiency, the 3.x series offers the first multi-cloud, self-service platform…
Cisco adds AI-powered voice intelligence capabilities to Webex Meetings
Would you like to have better, more engaged meetings? Cisco announced innovations to do just that—using only your voice. Cisco is introducing new AI-powered voice intelligence capabilities to Webex Meetings to help turn talk into action. The Cisco Webex Assistant…
Cequence CQ botDefense now available on AWS Marketplace as a SaaS
Cequence Security announced that its Application Security Platform (ASP) with CQ botDefense is now available as a Software-as-a-Service (SaaS) offering hosted on Amazon Web Services (AWS). The solution allows customers to protect public-facing applications from online fraud caused by automated…
ADVA’s FSP 3000 and FSP 150 platforms to play pivotal role in the OPENQKD project
ADVA announced that its FSP 3000 and FSP 150 platforms will play a pivotal role in the OPENQKD project. Leveraging its ConnectGuard technology, ADVA will provide optical and Ethernet encryptors as well as open line systems for multiple testbed locations.…
Björn Lidefelt joins HID Global as CEO
HID Global, a worldwide leader in trusted identity solutions, announces Björn Lidefelt has been named President and CEO. Björn joins the company after serving as Chief Commercial Officer (CCO) at HID parent company ASSA ABLOY, where he oversaw branding, communications,…
Trustmark appoints Britt Lindley as its new CISO
Trustmark Mutual Holding Company, a national employee benefits provider, has selected Britt Lindley as its new Chief Information Security Officer (CISO). Bradley Bodell, Chief Information Officer, made the announcement. “Britt’s deep breadth of leadership experience, his proven track record of…
Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks following the initial attack, Travelex struggled to bring its customer-facing systems back online. Worse still, despite Travelex’s assurances…
How to detect and prevent issues with vulnerable LoRaWAN networks
IOActive researchers found that the LoRaWAN protocol – which is used across the globe to transmit data to and from IoT devices in smart cities, Industrial IoT, smart homes, smart utilities, vehicle tracking and healthcare – has a host of…
Security risks for e-scooters and riders exposed
Micromobility vehicles, such as e-scooters, zip in and out of traffic. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion. However, a research out of UTSA finds e-scooters have risks beyond the perils of…
52% of companies use cloud services that have experienced a breach
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud with sensitive data While these companies approve an average of 41 cloud services…
Benefits of blockchain pilot programs for risk management planning
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept (POC) or pilot stage, according to Gartner. One of the main reasons for this development is that early blockchain pilots for supply chain pursued technology-oriented models that…
Security Compass enables CSPs to set up and develop their FedRAMP initiatives
Security Compass, a software security company that provides organizations with technology to make software secure, has introduced feature enhancements to SD Elements that enable cloud service providers (CSPs) to set up and develop their Federal Risk and Authorization Management Program…
Cisco’s first Cybersecurity Co-Innovation Center in Europe opens in Milan
Cisco‘s first Cybersecurity Co-Innovation Center in Europe opened its doors in Milan at the Leonardo da Vinci Science and Technology Museum. The center was inaugurated in the presence of Paola Pisano, Minister for Technological Innovation and Digitization; Roberto Baldoni, Deputy…
Cybraics partners with AVANT to expand reach of its AI-backed threat detection services
Cybersecurity and analytics firm Cybraics announced a partnership with AVANT, an IT decision-making platform for next-generation technologies, further expanding the reach of the company’s artificial intelligence-backed threat detection services. “We are excited to partner with AVANT to offer our advanced…
Alfresco and Tech Mahindra collaborate on four jointly-developed insurance solutions
Alfresco Software, an open source content, process and governance software company, and Tech Mahindra, a leading provider of digital transformation, consulting and re-engineering services and solutions, announced collaboration on four jointly-developed, transformative insurance solutions. The collaboration combines Tech Mahindra’s insurance…
Cymatic selects security experts for advisory roles
Cymatic announced the launch of its advisory board, a community of international security and risk experts providing brand counsel, technical guidance, and market leadership to ensure the success and relevance of the Cymatic next-generation all-in-one web application defense platform. Cymatic…
SecureLink announces distribution partnership with ShiftLeft for GCC and Egypt
SecureLink, a risk advisory firm based in Dubai and part of the StarLink group, the region’s “True” Value-Added-Distributor (VAD), announced signing a distribution partnership with ShiftLeft for GCC and Egypt. ShiftLeft is the fastest and most accurate application security testing…