Security News

IBM Security adds AI features to its Cloud Identity solution IBM Cloud Identity now features AI-based adaptive access capabilities that help continually assess employee or consumer user risk...

Sign up, tune in, expand your knowledge, and compete in hacking contests Promo On December 9, SANS will launch its second annual KringleCon virtual conference followed shortly thereafter by its...

Learning points, not an instruction manual Black Hat 2019 Faking digital evidence during a cyber attack – planting a false flag – is simple if you know how, as noted infosec veteran Jake Williams...

When a data breach or cyber attack hits the headlines one of the last things businesses are likely to consider is how cyber insurance could helped. Outside of a general awareness that cyber...

CyberSaint Governance Dashboard empowers CISOs to communicate compliance and risk posture in real-time CyberSaint Security announced significant updates to its Governance Dashboards that empower...

A third of Americans have been a victim of information fraud or identity theft. Despite notable data breaches in 2019, when asked if they update or change passwords/PINs after a company they do...

Sysdig Secure 3.0 provides enterprises with threat prevention at runtime Sysdig Secure 3.0 includes an incident response and audit tool for Kubernetes, giving enterprises the ability to...

'Unnecessary scaremongering' but still some work to be done Reports that the Home Office's Brexit app contains "serious vulnerabilities" that could expose the phone numbers, addresses and passport...

Mass-mail fail followed outfit's appearance at jobs fair BT Security managed to commit the most basic blunder of all after emailing around 150 infosec professionals who attended a jobs fair –...

Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors Waterfall for IDS provides hardware-enforced security that deploys transparently between OT networks and IDS...