Sixgill, a leading threat intelligence company, has appointed Meira Primes, a veteran strategist and marketer, as chief marketing officer. The appointment comes as Sixgill announced it is moving into larger offices to support growth as the company continues to capitalize…
Category: Help Net Security
SoftServe attains Data Analytics Specialization in Google Cloud Premier Partner Program
SoftServe, a leading digital authority and consulting company, has achieved the Data Analytics Specialization in the Google Cloud Premier Partner Program. This Partner Specialization affirms that SoftServe has demonstrated success turning large amounts of data into insights using Google Cloud…
Recommendations for navigating the dynamic cybercrime landscape
In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, talks about the most pressing issues CISOs are dealing with in today’s fast-fast paced threat environment. How has the cybersecurity threat landscape evolved in the past 5 years?…
You can upgrade Windows 7 for free! Why wouldn’t you?
“Doomsday is here! The sky is falling! Windows 7 is out of support and all hell will break loose!” – or, at least, that’s what some cybersecurity experts and press outlets want you to think. In this article, I will…
Patients believe stronger privacy protections are more important than easier health data access
Patients and consumers deserve better access to personalized, actionable health care information to empower them to make better, more informed decisions – but it should not drive up health care costs or compromise the privacy of their personal health data,…
Top 10 policy trends to watch for globally in 2020
The 10 top trends that will drive the most significant technological upheavals this year have been identified by Access Partnership. “Shifts in tech policy will disrupt life for everyone. While some governments try to leverage the benefits of 5G, artificial…
Grandstream launches two new additions to its GWN series of Wi-Fi Access Points
Grandstream, connecting the world since 2002 with award-winning unified communication solutions, announced the release of the two newest additions to their GWN series of Wi-Fi Access Points. The new GWN7602 is a 2×2 802.11ac Wi-Fi AP with an integrated Ethernet…
Swimlane version 10.0: Reducing mean time to detect and response for security incidents
Swimlane, an independent leader in security orchestration, automation and response (SOAR), announced the release of Swimlane version 10.0. The newest release has yielded up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search…
Fugue’s engineer empowerment and education as growth strategy in 2020
Fugue, the company empowering engineers to build and operate secure cloud systems, cites product innovation, growing awareness of cloud misconfiguration risk, and the engineer-led movement to address cloud security with engineering solutions as its primary drivers for growth in 2019.…
Adaptiva expands executive team in preparation for upcoming product launches
Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced strong financial results for 2019 along with significant expansion of its executive team in preparation for upcoming product launches and rapid growth in 2020, multiple…
CloudKnox Security raises $12M to accelerate customer growth and innovation
CloudKnox Security, a leader in identity authorization for hybrid and multi-cloud environments, announced that it closed $12M in a new round of funding. Led by Sorenson Ventures with participation from early investors, including ClearSky Security, Dell Technologies Capital and Foundation…
White Ops appoints Dr. Russell Handorf to Principal Threat Intelligence Hacker
White Ops, the global leader in bot mitigation, verifying the humanity of more than 1 trillion digital interactions per week, announced the appointment of Dr. Russell Handorf, former Computer Scientist with the FBI, to Principal Threat Intelligence Hacker. In his…
Week in review: Kubernetes security challenges, NIST Privacy Framework, Mitsubishi Electric breach
Here’s an overview of some of last week’s most interesting news and articles: Mitsubishi Electric discloses data breach, possible data leak Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that…
MDhex vulnerabilities open GE Healthcare patient monitoring devices to attackers
Researchers have discovered six critical and high-risk vulnerabilities – collectively dubbed MDhex – affecting a number of patient monitoring devices manufactured by GE Healthcare. The flaws may, according to GE Healthcare, allow an attacker to make changes at the device’s…
Lessons from Microsoft’s 250 million data record exposure
Microsoft has one of the best security teams and capabilities of any organization in the technology industry, yet it accidentally exposed 250 million customer records in December 2019. The data was accessible to anyone with a browser, who knew the…
CISOs: Make 2020 the year you focus on third-party cyber risk
While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this challenge. If there is one work-related New Year’s resolution I’d like CISOs to…
Over half of organizations were successfully phished in 2019
Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. Seventy-eight percent also reported that security awareness training activities resulted in…
More authentication and identity tech needed with fraud expected to increase
The proliferation of real-time payments platforms, including person-to-person (P2P) transfers and mobile payment platforms across Asia Pacific, has increased fraud losses for the majority of banks. FICO recently conducted a survey with banks in the region and found that 4…
BigID launches Discovery-In-Depth technology to provide orgs with visibility into PI and sensitive data
BigID, the leader in personal data privacy and protection, announced their Discovery-In-Depth technology to provide organizations with unprecedented visibility and insight into personal and crown jewel data. The new technology builds on BigID’s patented Correlation technology for finding any Personal…
Citrix Systems and FireEye introduce new tool for detection of compromise
Citrix Systems and FireEye announced the launch of a new tool for detection of compromise in connection with the previously announced CVE-2019-19781 vulnerability, which affects certain versions of Citrix Application Delivery Controller (ADC), Citrix Gateway, and two older versions of…
Ixia adds new ML features in the Hawkeye active network monitoring platform
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced the addition of new machine learning (ML) features in the Hawkeye active network monitoring platform from Ixia, a…
HiveIO updates Hive Fabric with added data protection, backup to the cloud, and app insights
HiveIO announced version 8.0 of Hive Fabric, an intelligent virtualization solution that provides high-performing, scalable technology that removes complexity in the data center and delivers a seamless IT experience. The new version provides protection for virtual machines (VMs) and user…
Bank-Verlag signs up for 3-D Secure authentication solution from Entersekt and Netcetera
Entersekt described the latest implementations of its authentication technology in Europe’s DACH region. The fintech firm announced that Netcetera, a payments technology specialist and long-standing regional partner, has implemented the system for Bank-Verlag, which builds and operates secure digital services…
Mastercard and The Rockefeller Foundation unveil new platform for data science partnerships
The Mastercard Center for Inclusive Growth and The Rockefeller Foundation announced data.org as a platform for partnerships that will continue to build the field of data science for social impact. This is the next chapter of a $50 million commitment…
DISA awards Intelligent Waves with the global satellite communications contract
Intelligent Waves, an end-to-end information technology government solutions provider, announced that it was awarded a competitive, single award indefinite-delivery/indefinite-quantity (IDIQ) contract with the Defense Information Systems Agency (DISA). The contract called Enhanced Mobile Satellite Services (EMSS) Global Logistical Services Management…
Syniverse and AiRXOS to provide a communications infrastructure that manages drones
Technology innovators Syniverse and AiRXOS, a wholly owned subsidiary of GE Aviation, announced they are working together to protect the skies by providing a communications infrastructure that manages drones and other unmanned aerial vehicles operating at low altitudes. The collaboration…
Moody’s acquires RDC to expand its range of data solutions
RDC, the global leader in risk intelligence compliance screening, announced it has entered into a definitive agreement to be acquired by Moody’s Corporation. The RDC acquisition positions Moody’s Analytics’ Bureau van Dijk (BvD), a leading provider of business intelligence and…
STACK INFRASTRUCTURE and Peterson Companies to develop a data center campus in Manassas, VA
STACK INFRASTRUCTURE, the data center company built from the ground up to address the technology infrastructure needs of rapidly scaling enterprises and hyperscale businesses, and Peterson Companies, one of the largest privately-owned real estate development companies in the DC region,…
Kristen Robinson joins Splunk as Chief People Officer
Splunk, provider of the Data-to-Everything Platform, announced it has appointed Kristen Robinson as the company’s first Chief People Officer. Robinson, who will play a critical role in accelerating Splunk’s continued transformation journey, has more than 25 years of experience pioneering…
Onapsis appoints Dave DeWalt as Vice Chairman to its board of directors
Onapsis, the leader in business application protection, announced the appointment of Dave DeWalt as Vice Chairman to its board of directors. The strategic addition to the Onapsis board immediately follows the company closing a record year of progress, highlighted by…
IoC Scanner shows if Citrix appliances have been compromised via CVE-2019-19781
Citrix and FireEye have teamed up to provide sysadmins with an IoC scanner that shows whether a Citrix ADC, Gateway or SD-WAN WANOP appliance has been compromised via CVE-2019-19781. Finding evidence of compromise By now it should be widely known…
It’s time to patch your Cisco security solutions again
Cisco has released another batch of security updates and patches for a variety of its offerings, including many of its security solutions. Security fixes for security solutions Among the security holes plugged is CVE-2019-16028, a critical authentication bypass vulnerability affecting…
Cybercriminals using fake job listings to steal money, info from applicants
Be extra careful when looking for a job online, the Internet Crime Complaint Center (IC3) warns: cybercriminals are using fake job listings to trick applicants into sharing their personal and financial information, as well as into sending them substantial sums…
Zero Trust: Beyond access controls
As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One common misconception: Zero Trust is all about access controls and additional authentication, such…
There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for the training process, but the derived system is also provided with…
CIOs using AI to bridge gap between IT resources and cloud complexity
There’s a widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems, a Dynatrace survey of 800 CIOs reveals. IT leaders around the world are concerned about their ability to support…
NETSCOUT delivers DDoS visibility and protection for service providers and large enterprises
NETSCOUT, a market leader in service assurance, security, and business analytics, announced Arbor Sightline with Sentinel to deliver the next generation of DDoS visibility and protection for service providers and large enterprises. Combining core ARBOR NETWORKS and NETSCOUT Layer 7…
GoSecure adds Insider Threat Detection and Response to its portfolio
GoSecure, a leading provider of Managed Detection and Response (MDR) services and a predictive Endpoint Detection and Response (EDR) platform, announced the addition of Insider Threat Detection and Response to their portfolio. Insider incidents caused by malicious insiders, or where…
Privafy unveils cloud-native, security-as-a-service application to protect Data-in-Motion
Privafy unveiled a fundamentally new approach to data security that protects organizations against modern Data-in-Motion threats while disrupting the cost associated with complex, archaic network solutions. The company’s cloud-native application will secure Data-in-Motion as it moves across locations, clouds, mobile…
OneLogin launches Trusted Experience Platform, a complete IAM solution for enterprises
OneLogin introduced the Trusted Experience Platform, an identity foundation that enables companies to provide secure, scalable and smart experiences. The platform is a complete identity and access management (IAM) solution that leverages OneLogin’s investment and expertise in AI, seamlessly managing…
buguroo enhances its bugFraud solution with New Account Fraud prevention capabilities
buguroo, the online fraud prevention solutions specialist for the financial sector, unveiled further capabilities that make it easier for banks to identify fraudsters attempting to open new bank accounts. These enhanced New Account Fraud prevention capabilities – included in the…
RiskRecon joins with Mastercard to help customers achieve good third-party risk outcomes
RiskRecon, the world’s leading platform for easily understanding and acting on third-party cyber risk, and now a Mastercard company, announces its continued commitment to enabling the success of its customers in achieving good third-party risk outcomes, built on a foundation…
Axio joins the Cyber Readiness Institute to help orgs become more resilient and cyber ready
The Cyber Readiness Institute (CRI) is excited to welcome Axio, a leading cyber risk management SaaS company, to its Champion network. In collaboration with Axio, CRI Champions, members and users will now have access to a free tool, offered by…
Zenuity chooses HPE to develop next generation autonomous driving systems
Hewlett Packard Enterprise (HPE) has been selected by Zenuity, a leading developer of software for self-driving and assisted driving cars, to provide the crucial artificial intelligence (AI) and high-performance computing (HPC) infrastructure it needs in order to develop next generation…
Coalition improves its cyber insurance and security platform with the acquisition of BinaryEdge
Coalition, the leading cyber insurance provider for small and midsize businesses, announced it has acquired Internet scanning and cybersecurity pioneer BinaryEdge. Coalition will integrate BinaryEdge’s technology with its cyber insurance and security platform, allowing Coalition policyholders to easily map their…
FireEye acquires Cloudvisory to add cloud workload security capabilities to FireEye Helix
FireEye, the intelligence-led security company, announced the acquisition of Cloudvisory. The acquisition, which closed on January 17, 2020, will add cloud workload security capabilities to FireEye Helix, offering customers one integrated security operations platform for cloud and container security. “Customers…
Varicent acquires Symon.AI to provide enhanced analytics to business users and data scientists
Varicent, the leading provider of next generation Sales Performance Management (SPM), announced that it has acquired Symon.AI, a visionary technology platform built on sophisticated Natural Language and Machine Learning algorithms that provide easy to use, advanced analytics to business users…
Vicarius raises $5 million to accelerate international growth and operating scale
Vicarius, the predictive cyberthreat provider, announced seed funding of $5 million. The funding round was led by Jerusalem Venture Partners (JVP), with innogy Innovation Hub and Goldbell also investing. The funding will accelerate the company’s international growth and operating scale,…
Sysdig raises $70M to enable enterprises to confidently run cloud-native workloads in production
Sysdig, the secure DevOps leader, announced it raised $70 million in Series E funding led by Insight Partners with participation from previous investors, Bain Capital Ventures and Accel. Glynn Capital also joined this round, along with Goldman Sachs, who joined…
Alison Lewis joins Neustar’s Board of Directors
Neustar, a global information services company and leader in identity resolution, announced that Alison Lewis has been appointed as an independent, non-executive director to the Company’s Board of Directors. Lewis is Chief Growth Officer and member of the Global Executive…
FireMon expands leadership team with Andrew Warren as vice president of global channel sales
FireMon has announced the latest addition to its innovative leadership team, Andrew Warren, as vice president of global channel sales. As a leading network security policy management company, FireMon improves visibility and control over cloud and hybrid infrastructures to reduce…
Did Apple drop end-to-end encrypted iCloud backups because of the FBI?
Two years ago, Apple abandoned its plan to encrypt iPhone backups in the iCloud in such a way that makes it impossible for it (or law enforcement) to decrypt the contents, a Reuters report claimed on Tuesday. Based on information…
Honeywell Maxpro VMS/NVR systems vulnerable to hijacking
Honeywell’s Maxpro VMS and NVR, network video recorders and video management systems deployed in commercial, manufacturing and energy facilities around the world, sport critical vulnerabilities that may allow attackers to take control of them. Patches available for the Honeywell Maxpro…
Container security requires continuous security in new DevSecOps models
When Jordan Liggitt at Google posted details of a serious Kubernetes vulnerability in November 2018, it was a wake-up call for security teams ignoring the risks that came with adopting a cloud-native infrastructure without putting security at the heart of…
Companies risk revenue growth due to innovation achievement gap
While a majority of CEOs express strong confidence in the effectiveness of their current IT systems, most are struggling to close the innovation achievement gap to drive growth and revenue, according to a global study by Accenture. The is based…
Email security industry miss rates when encountering threats are higher than 20%
Email security miss rates are definitely a huge issue. Malicious files regularly bypass all of today’s leading email security products, leaving enterprises vulnerable to email-based attacks including ransomware, phishing and data breaches, according to BitDam. BitDam conducted an empirical study…
State CIOs see innovation as critical priority, only 14% report extensive innovation
Most state CIOs see innovation as a major part of their job – 83% said innovation is an important or very important part of their day-to-day leadership responsibilities – while only 14% reported extensive innovation initiatives within their organizations, Accenture…
Download: State of Breach Protection 2020 survey results
What are the key considerations security decision makers should take into account when designing their 2020 breach protection? To answer this, Cynet polled 1,536 cybersecurity professionals to understand the common practices, prioritizations and preferences of organization today in protecting themselves…
Stellar Cyber’s new app applies machine learning to firewall data to spot anomalies
Security provider Stellar Cyber, with the first Open-XDR platform, announced its new Firewall Traffic Analysis (FTA) Application, which supercharges firewalls by analyzing their data to spot undetected anomalies. With this new App, security analysts get an automated assistant to detect…
FireEye Mandiant unveils two new services to help orgs improve detection, investigation, and response
FireEye, the intelligence-led security company, announced the availability of two new FireEye Mandiant services. Cloud Security Assessments help organizations evaluate and harden security in cloud platforms, and Cyber Defense Operations consulting services help organizations achieve security transformation by improving the…
STEALTHbits StealthRECOVER 1.5: Easier and faster AD rollback and recovery
STEALTHbits Technologies, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announced the release of StealthRECOVER 1.5, their fine-grained rollback and recovery solution for Active Directory (AD). As a…
Skylo raises $116M to bring affordable IoT connectivity to over 1 billion devices globally
Skylo, maker of the world’s most affordable and ubiquitous network that connects any machine or sensor, announced that the company has emerged from Stealth with $116 million in total funding. The company previously raised $13 million in a Series A…
Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects
ACROS Security has released a micropatch that implements the workaround for a recently revealed actively exploited zero-day RCE flaw affecting Internet Explorer (CVE-2020-0674). Remote code execution vulnerability affecting IE Last Friday, Microsoft released an out-of-band security advisory notifying Internet Explorer…
First patches for the Citrix ADC, Gateway RCE flaw released
As attackers continue to hit vulnerable Citrix (formerly Netscaler) ADC and Gateway installations, Citrix has released permanent fixes for some versions and has promised to provide them for other versions and for two older versions of SD-WAN WANOP by January…
Researchers create OT honeypot, attract exploits and fraud
Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. Hardware equipment that ran the factory Complex investigation The six-month investigation revealed that…
Mitsubishi Electric discloses data breach, possible data leak
Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that “personal information and corporate confidential information may have been leaked.” The company, though, claims that “sensitive information on social infrastructure such…
Data-driven vehicles: The next security challenge
Companies are increasingly building smart products that are tailored to know the individual user. In the automotive world, the next generation passenger vehicle could behave like a personal chauffeur, sentry and bodyguard rolled into one. Over the next decade, every…
Review: Enzoic for Active Directory
Seemingly every day news drops that a popular site with millions of users had been breached and its user database leaked online. Almost without fail, attackers try to use those leaked user credentials on other sites, making password stuffing one…
Techniques and strategies to overcome Kubernetes security challenges
Five security best practices for DevOps and development professionals managing Kubernetes deployments have been introduced by Portshift. Integrating these security measures into the early stages of the CI/CD pipeline will assist organizations in the detection of security issues earlier, allowing…
Revenue from cloud IT infrastructure products declines
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, declined in the third quarter of 2019 (3Q19) as the overall IT infrastructure market continues to experience weakening…
BakerHostetler’s multidisciplinary practice group helps clients leverage data and technology
Data is everything to businesses and organizations across the globe. For more than a decade, different teams at law firm BakerHostetler have been at the forefront of helping clients leverage data and technology to transform their products and services. Following…
Datadog expands support for channel partners with Partner Network
Datadog, the monitoring and analytics platform for developers, IT operations teams and business users in the cloud age, announced the Datadog Partner Network, a new program expanding Datadog’s support for channel partners. The Datadog Partner Network will bring benefits to…
Mellanox OpenStack software includes native upstream support for HDR 200 Gb InfiniBand network
Mellanox Technologies, a leading supplier of high-performance, end-to-end smart interconnect solutions for data center servers and storage systems, announced that OpenStack software includes native and upstream support for virtualization over HDR 200 gigabit InfiniBand network, enabling customers to build high-performance…
Synopsys joins Autonomous Vehicle Computing Consortium to deliver safer and affordable vehicles
Synopsys announced that it has joined the new Autonomous Vehicle Computing Consortium. The Consortium brings together leading experts in the automotive, automotive supply, semiconductor and computing industries to help accelerate the delivery of safer and affordable vehicles. As a member…
Anexsys partners with Brainspace to help clients solve complex data challenges
Anexsys, the leading UK consulting firm specialising in legal support and e-discovery is delighted to announce their new partnership with Brainspace, the world’s leading data analytics platform for investigations, eDiscovery, and compliance. Anexsys has integrated the Brainspace platform as part…
Quanergy Systems announces corporate changes to drive next phase of growth
Quanergy Systems, a leading provider of LiDAR (Light Detection and Ranging) sensors and perception software solutions, announced a number of important corporate changes to ensure successful execution in the company’s next phase of growth. The fast-growing global LiDAR market is…
WorldRemit appoints Scott Eddington to lead the Asia Pacific business
Leading mobile payments company WorldRemit has appointed seasoned digital executive Scott Eddington to lead the Asia Pacific business as it positions itself to help even more customers make secure, quick and affordable cross border payments. Scott will be responsible for…
Judi Dotson to lead Booz Allen Hamilton’s National Security business
Booz Allen Hamilton announced that Judi Dotson, an Executive Vice President, will lead the firm’s National Security business and join the firm’s Leadership Team, effective April 1. Throughout her 31 years at the firm, Dotson has developed market strategies, built…
A look at cybersecurity for rail systems, building automation and the future of critical infrastructure
Waterfall Security Solutions announced a major expansion into new markets and industry verticals. In support of this expansion, Waterfall has secured a significant new funding round to enable aggressive growth. We caught up with Lior Frenkel, CEO and co-founder of…
Waterfall Security Solutions secures significant new funding round
Waterfall Security Solutions, the OT security company, announced a major expansion into new markets and industry verticals. In support of this expansion, Waterfall has secured a significant new funding round to enable aggressive growth. Waterfall’s priorities for expansion are rail…
NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s privacy. To help organizations keep this balance, the National Institute of Standards and Technology (NIST) is offering…
Business units and IT teams can no longer function in silos
Over the next two years, 50% of organizations will experience increased collaboration between their business and IT teams, according to Gartner. The dispute between business and IT teams over the control of technology will lessen as both sides learn that…
Apria Healthcare leverages Absolute to protect patient data and ensure HIPAA compliance
To ensure the highest levels of endpoint security across more than 8,000 devices and to help achieve HIPAA compliance in the face of rising data breaches across the healthcare industry, Apria Healthcare leverages Absolute, the leader in endpoint resilience, for…
CyberArk’s new just-in-time access capabilities help reduce risk and improve operational efficiency
CyberArk, the global leader in privileged access management, unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies. By extending just-in-time support with the ability to remove unnecessary standing access…
Virsec partners with ProtectedIT to offer cybersecurity protections to its clients
Virsec, a cybersecurity company delivering a radically new approach to protect against advanced targeted attacks, announced it has partnered with ProtectedIT, a leader in delivering enterprise security solutions, remote infrastructure, and cloud services to offer advanced cybersecurity protections to its…
Fortanix announces record sales year, new partnerships and global expansion in 2019
Fortanix, the Runtime Encryption company, announced it had a record year in 2019, which saw sales climb 285 percent over the previous record year. Important new partnerships with Equinix, Google, IBM and Intel set the stage for both innovation and…
Skyview Capital acquires Fidelis Cybersecurity to expand portfolio and accelerate growth
Global private investment firm Skyview Capital has added to its software technology portfolio with the acquisition of Bethesda, MD-based Fidelis Cybersecurity from a consortium of investors in a stock transaction. Fidelis Cybersecurity is a leading provider of Network Traffic Analysis…
Security Compass secures funding to enhance solutions portfolio and accelerate growth
Security Compass, a leading provider of enterprise DevSecOps software solutions, announced it has secured growth equity funding from FTV Capital, a sector-focused growth equity investment firm. This investment will enable Security Compass to enhance its position as a global leader…
Bill Staples joins New Relic as chief product officer
New Relic, the industry’s largest and most comprehensive cloud-based observability platform built to help customers create more perfect software, announced that Bill Staples will join New Relic as chief product officer on February 14, 2020. Reporting directly to CEO and…
ISACA appoints Julia Kanouse as senior vice president of membership
Bringing a rich tech background and executive experience in the association sector, Julia Kanouse has joined ISACA’s leadership team as senior vice president of membership. ISACA has more than 145,000 members in 188 countries working in information and cyber security,…
Zscaler elects David Schneider to its Board of Directors
Zscaler, the leader in cloud security, announced that Zscaler stockholders elected David Schneider to its Board of Directors at the annual stockholder meeting held January 10, 2020. Schneider is President, Global Customer Operations at ServiceNow. Mr. Schneider’s term will expire…
Peter Leav joins McAfee as Chief Executive Officer
McAfee, the device-to-cloud cybersecurity company, announced that its Board of Managers has appointed Peter Leav to the role of Chief Executive Officer, effective February 3, 2020. Leav will succeed Chris Young, who has decided to step down as Chief Executive…
ioXt appoints Gregory Guez to its board of directors
ioXt, the global standard for IoT security and preeminent IoT security alliance, announces the appointment of Gregory Guez, Senior Director of Product Marketing, IoT Security at Silicon Labs, to its board of directors. As a founding member of the ioXt…
Resolve Systems promotes Vijay Kurkal to Chief Executive Officer
Resolve Systems, the leader in enterprise IT automation and AIOps, announced the promotion of Vijay Kurkal to Chief Executive Officer, effective immediately. Since joining the company as Chief Operating Officer in 2018, Kurkal has been instrumental in the company’s global…
Week in review: Windows crypto flaw, API security risks, exploits for Citrix security hole abound
Here’s an overview of some of last week’s most interesting news and articles: Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A vulnerability (CVE-2019-19494) in Broadcom‘s cable modem firmware can open unknown millions of broadband modems by…
Microsoft Application Inspector: Check open source components for unwanted features
Want to know what’s in an open source software component before you use it? Microsoft Application Inspector will tell you what it does and spots potentially unwanted features – or backdoors. About Microsoft Application Inspector “At Microsoft, our software engineers…
IoT cybersecurity’s worst kept secret
By improving access to data and taking advantage of them in fundamentally different ways to drive profitability, IT security executives are rapidly changing perceptions of their office. Although making better sense of and use of data may be standard fare…
New infosec products of the week: January 17, 2020
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications Masergy Shadow IT Discovery immediately scans and identifies all applications, providing clients visibility through the SD-WAN management portal. Until now, IT departments have had to rely on a variety of endpoint…
How to govern cybersecurity risk at the board level
Rapidly evolving cybersecurity threats are now commanding the attention of senior business leaders and boards of directors and are no longer only the concern of IT security professionals. A report from University of California, Berkeley’s Center for Long-Term Cybersecurity (CLTC)…
Worldwide IT spending to total $3.9 trillion in 2020
Worldwide IT spending is projected to total $3.9 trillion in 2020, an increase of 3.4% from 2019, according to the latest forecast by Gartner. Global IT spending is expected to cross into $4 trillion territory next year. “Although political uncertainties…