Security News
Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors Waterfall for IDS provides hardware-enforced security that deploys transparently between OT networks and IDS...
Tales from the coal face as experts reflect on what can possibly go wrong on the job Analysis It has been six weeks since Coalfire's Gary Demercurio and Justin Wynn were nabbed in Dallas County,...
How a close-knit hero-worshiping culture can make reporting abusers difficult – and how help is at hand Cassie was studying for the computer security industry qualification CISSP when the...
Jetico releases BestCrypt Volume Encryption Enterprise Edition for Mac Jetico launched BestCrypt Volume Encryption – Enterprise Edition for Mac. Expanding on many years of Windows support, Jetico...
Delta Risk ActiveEye 2.0 eliminates more than 95% of false positives With a focus on advanced security automation, the ActiveEye 2.0 platform eliminates more than 95 percent of false positives...
Pradeo Secure Private Store facilitates and expands safe BYOD usage Pradeo launched a unique Secure Private Store solution that allows organizations to distribute mobile services to their...
FireEye Digital Threat Monitoring: Visibility beyond your walls FireEye Digital Threat Monitoring automatically collects and analyzes content on the dark and open web, alerting defenders whenever...
Anomali Altitude automates detection, analysis, and threat response The Anomali Altitude platform delivers Anomali Lens, Anomali ThreatStream, and Anomali Match. The integrated product suite...
Six in every ten businesses have experienced a breach in either in the last three years. At least a third of infosec professionals (36%) whose employers had not recently been a victim of a cyber...
There is an uncomfortable truth that many organizations are not conducting comprehensive assessments of their information security risk; or those that do aren’t getting much value out of...