Security News

Aruba collaborates with Microsoft to accelerate digital transformation from edge-to-cloud
2021-03-04 00:15

Aruba, a Hewlett Packard Enterprise company in collaboration with Microsoft, announced two new solutions that enable organizations to accelerate their digital transformation from edge-to-cloud by delivering deeper integration between Aruba ESP and Microsoft Azure. Announced at Microsoft Ignite 2021, the first solution is Aruba IoT Transport for Azure, a service that enables IoT devices connected to Aruba access points and controllers to bi-directionally communicate with the Azure IoT Hub.

Corsair M360 HENOTIC API management platform delivers capabilities for digital integration
2021-03-03 02:30

Corsair M360 announced its HENOTIC API management platform. HENOTIC is engineered to deliver next-generation capabilities to companies tackling the digital integration challenges among clouds, applications, data, and infrastructure.

Lenovo ThinkEdge devices enable digital transformation at the edge
2021-03-03 01:30

Building from the existing edge portfolio from Lenovo, the ThinkEdge devices - the new ThinkEdge SE30 and ThinkEdge SE50 - are small, rugged, and powerful enough to meet the demanding needs of enterprise data processing, security and scalability at the edge. The global pandemic has become a catalyst for digital transformation and accelerated the push to the edge for many levels of the enterprise, as new solutions for operations and sales are introduced in global markets.

SailPoint extensibility helps customers secure their digital ecosystem
2021-03-02 02:00

Delivering on the SailPoint vision to embed identity into the cloud enterprise's digital fabric, SailPoint announced additional extensibility functionality to its platform. To enable customers and partners to find value with the updates, SailPoint also introduced the new SailPoint Developer Community to help them move quickly and with less effort.

Protecting the digital workplace with an integrated security strategy
2021-03-01 06:30

Is it possible to secure this new digital world, when IT security teams are still struggling to protect the old one? The answer is yes, but it won't be through buying more security tools. Here's the good news: as security controls move to the cloud, we have a unique opportunity to break free from this legacy approach and rethink how security and related IT and security controls are implemented, integrated and automated in this new environment.

India's demand to identify people on chat apps will 'break end-to-end encryption', say digital rights warriors
2021-02-26 02:10

After a three-year review process, India has announced strict regulations for instant chat services, social network operators, and video-streaming companies. India's Internet Freedom Foundation has slammed this traceability requirement, claiming it will be impossible to implement strong end-to-end encryption as a result, and thus could harm privacy.

Digital Guardian enhances connection with AWS through key initiatives and achievements
2021-02-26 00:30

Digital Guardian announced it significantly enhanced its relationship with Amazon Web Services through several key initiatives and achievements. Digital Guardian has announced the general availability of their integration with Amazon Macie, a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and provide additional protection for customers' sensitive data in AWS. As organizations manage growing volumes of data, identifying and protecting their sensitive data at scale can become increasingly complex, expensive, and time-consuming.

IT leaders form coalition to develop open standard for tracing the evolution of digital content
2021-02-23 09:45

A group of influential technology and media companies has partnered to form the Coalition for Content Provenance and Authenticity, a Joint Development Foundation project established to address the prevalence of disinformation, misinformation and online content fraud through developing technical standards for certifying the source and history or provenance of media content. C2PA member organizations will work together to develop content provenance specifications for common asset types and formats to enable publishers, creators and consumers to trace the origin and evolution of a piece of media, including images, videos, audio and documents.

Neustar’s digital and call center identity service approved by Kantara
2021-02-19 00:30

As the provider of a Credential Service, approved by Kantara Initiative, Neustar can more effectively serve the federal market and address digital identity proofing and authentication service requirements with accurate, frictionless identity verification. "From coordinating complex federal initiatives, like contact tracing, to fielding daily service calls involving the transfer of personal and financial information, it is critical that governments have the proper tools in place to verify the identity of the person on the other end of the interaction with confidence, speed and accuracy," said Tom McNeal, vice president of partner channel and public sector for Neustar.

Cobwebs visual link analysis tool enables investigators to visualize digital footprints
2021-02-18 02:15

Cobwebs visual link analysis tool enables investigators to find and visualize real-world relationships between pieces of information from various sources located on the web in an organized, dynamic graph. Investigators rely on big data collection and analysis for getting actionable Intelligence to wrap up their investigations.