Security News

NSFOCUS announced the launch of NSFOCUS Exposed Internet Surface Analysis (EISA), a new capability to address the cyber security risk faced by organizations today. EISA identifies malicious...

Cybersecurity solutions provider Trend Micro and HITRUST, a non-profit organization that promotes the protection of sensitive data, have joined forces to launch a new company that offers cyber...

Trend Micro and HITRUST announced they are partnering to launch Cysiv, a new company which provides cyber risk management as a service to select U.S. enterprises that need to better defend...

Data breaches, ransomware and other cyber attacks causing massive reputation issues (Equifax), knocking down merger prices (Yahoo!) or interrupting operations on a global scale (the NotPetya virus...

Secure Systems Innovation Corporation (SSIC) is announcing the upcoming release of X-Analytics 2.0, its patented cyber risk analytics model. The new release includes several additions to deliver...

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and tailored scanning and...

Security Teams Can Shift the Risk/Reward Ratio and Make ERP Applications Less Attractive Targets A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource...

Salk Lake City-based RiskRecon, which offers solutions to help companies manage third-party cyber risk, has raised $25 million in Series B financing, the company announced Wednesday. read more

Tell any IT professional that the computer running the electrical grid has not been updated in 20 years, or that the machine that controls operations in the bottling plant was last tuned up when...

In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and disclosure requirements....