NEWS

TIBCO and Ping Identity partner

TIBCO Software has formed an official partnership with Ping Identit. Together, TIBCO Cloud™ Mashery® and the PingIntelligence for APIs solution bring seamless, AI-powered protection against new emerging API threats to customers. TIBCO Cloud Mashery is a complete solution for digital leaders, IT leaders, and chief information security officers to invest in API-led, cloud-native transformation for their organizations, with advanced API security at its heart.

Read More

NEWS

CyberX enhances Industrial Threat Intelligence

CyberX, the IoT and industrial control system (ICS) security company, has enhanced its specialized IoT/ICS threat intelligence capabilities with a new automated threat extraction platform that uses machine learning to identify malware and APT campaigns targeting industrial and critical infrastructure organizations.

Read More

NEWS

FIDO Alliance announces new identity verification and IoT initiatives

New working groups formed to secure adjacent technologies that are critical for end-to-end identity lifecycle management.

Read More

NEWS

Ping introduces multi-factor authentication capabilities

Ping Identity has intoduced updates to its multi-factor authentication (MFA) solution, PingID, providing new methods to mitigate risk and strengthen security for enterprises. PingID’s new features include ways to evaluate user and device risk before access is granted, as well as support for Fast Identity Online (FIDO) standards to increase resistance to advanced phishing attacks. With phishing resistant and user-friendly authentication methods—including biometric authenticators, such as...

Read More

VIDEO

Cisco Stealthwatch - network and cloud threat detection

It should be: With today's attack landscape, continuous threat detection and monitoring is a must-have, not an option. See how Stealthwatch can help by analyzing your entire network traffic, on-premises or in the cloud. It reduces massive data sets to high-fidelity alarms using behavioral modeling, machine learning and Talos threat intelligence.

Read More

BLOG

Where does the responsibility for cloud breaches lie?

The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking responsibility for breaches in the cloud. It’s a good question. The advent of Hybrid IT, among other things, has done much to destroy our traditional notions of the perimeter, with its siloed networks and fortress-like mentality. By Scott Gordon (CSSP), CMO, Pulse Secure.

Read More

Organisations perceive threat level to be ‘very significant,’ with a third planning greater...
New internal firewall solution locks down known good behaviour at both the network and host level...
Barracuda SecureEdge is delivered as a service, makes security deployment and management easier for...
Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...
Aqua 4.0 release also tightens Linux host protection and compliance on the heels of recent...
Combining the best of Kaseya Connect and DattoCon, the first joint event since the acquisition of...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more