Trend Micro and HITRUST Launch New Company to Provide Cyber Risk Management...
Cysiv extends and elevates in-house, enterprise security capabilities and operations DALLAS (BUSINESS WIRE) Trend ( TYO: ; TSE: ), a global leader in cybersecurity solutions, and HITRUST , a leading...
View ArticleKnightscope Showroom NYC Brings “Security Team of the Future” to Midtown...
Company offers clients and community hands-on, interactive experience with award-winning security robots and cutting-edge autonomous crime-fighting technology NEW YORK (BUSINESS WIRE) #MiniIPO ―...
View ArticleArms race: SiFive, Hex Five build code safe houses for RISC-V chips
If you've been looking at SiFive's RISC-V-based chip technology and thinking, y'know what, it's missing an Arm TrustZone-style element to run sensitive code, well, here's some good news. And if you're...
View ArticleInfosys gets Australian Open gig as IBM given the boot
Tennis Australia's technology needs for the Australian Open in 2019, and for the next two years thereafter, will be provided by the Indian outsourcing giant Infosys, which has signed a three-year deal...
View ArticleFrom Dev to Infosec Making Friends
Whenever you enter a new community, the hardest part is always finding your way around and making friends. With InfoSec, it’s analogous to being dropped in the middle of Europe without a map, and you...
View ArticleCalifornia’s bad IoT law
California has passed an IoT security bill , awaiting the government’s signature/veto. It’s a typically bad bill based on a superficial understanding of cybersecurity/hacking that will do little...
View ArticleThe best IAM software: Rating the top 10 products
What are your company's biggest assets? Arguably you can break them down into two groups: People , which includes productive employees, loyal customers and efficient partners. Data , which includes...
View ArticleExploit vendor drops Tor Browser zero-day on Twitter
Zerodium, a company that buys and sells vulnerabilities in popular software, has published details today on Twitter about a zero-day vulnerability in the Tor Browser, a Firefox-based browser used by...
View ArticleDevOps Demystified: A Primer for Security Practitioners
Key starting points for those still struggling to understand the concept. Back when I was burning up the ISSA and ISACA speaking circuit, I passed out a quiz before each presentation. The quiz focused...
View ArticleIDG Contributor Network: User behavior analytics is not a silver bullet
Home Analytics IDG Contributor Network Want to Join? The Security Log By Monzy Merza ,Contributor, CSO | Sep 10, 2018 8:00 AM PT Opinions expressed by ICN authors are their own. Opinion User behavior...
View ArticleEngaging the CSIRT Community: Cyber Capacity Building on a Global Scale
Angel L. HuecaSenior Computer Security Information AnalystCERT Division At the 2018 World Economic Forum , global leaders voiced concerns about the growing trend of cyberattacks targeting critical...
View ArticleWhat You Need to Know About the TLS 1.3 Protocol and WolfSSL’s TSL/SSL...
Security protocols, like communication protocols, are currently in competition to set industry-wide standards. What is the TLS 1.3 protocol? How does this security protocol differ from SSL? WolfSSL, a...
View ArticleIDG Contributor Network: Threat detection: it’s about ‘time’
Incident responders have no shortage of products that help to identify threats. From the earliest virus scanners and IDS products to modern solutions that utilize machine learning to analyze behavior,...
View ArticleRedesigning computing for cloud workers and the digital workplace
Editor’s note: In today’s guest post, Nick McQuire, vice president of enterprise research at CCS Insight, shares more on how the era of the cloud worker is shaping IT and device strategy. You can also...
View ArticleTrueKey: the not so uncommon story of a failed patch
In this blog post, we examine the vendor-supplied patch addressing CVE-2018-6661 . The vulnerability was initially reported to Intel Security (McAfee) in June 2017 and disclosed publicly in April...
View ArticleZero-Day Tor Browser Exploit Bypassed NoScript to Execute Malicious Code
Zerodium unveiled in a tweet a Tor Browser 7.x zero-day exploit which circumvented NoScript's'Safest' security level to run malicious code inside the browser. Tor Browser is a modified version...
View ArticleCybersecurity is Rapidly Changing
"We cannot control our adversary," says Rick McElroy , Security Strategist for CarbonBlack , a leading next-generation cybersecurity firm. "Although we can choose to control them once in our...
View ArticleThe Equifax Breach One Year Later: 6 Action Items for Security Pros
The Equifax breach last September was the largest consumer breach in history. We talked to experts about lessons learned and steps companies can take to prevent and minimize future breaches. 1 of 7...
View ArticleThis NYC Startup Just Raised $18M to Deploy The Most Advanced Industrial...
Industrial infrastructures like power plants, oil & gas pipelines, and water treatment facilities are vulnerable to attacks, and it isn’t that difficult to get access to the operational technology...
View ArticleExchanges Roundup: Startup Targets Crypto Micro-Investments, Kraken Denies...
Exchanges 7 hours ago| By Samuel Haig - | Exchanges Roundup: Startup Targets Crypto Micro-Investments, Kraken Denies Halifax Closure In recent news pertaining to cryptocurrency exchanges, Perth-based...
View Article