Security News

When a data breach or cyber attack hits the headlines one of the last things businesses are likely to consider is how cyber insurance could helped. Outside of a general awareness that cyber...

CyberSaint Governance Dashboard empowers CISOs to communicate compliance and risk posture in real-time CyberSaint Security announced significant updates to its Governance Dashboards that empower...

A third of Americans have been a victim of information fraud or identity theft. Despite notable data breaches in 2019, when asked if they update or change passwords/PINs after a company they do...

Sysdig Secure 3.0 provides enterprises with threat prevention at runtime Sysdig Secure 3.0 includes an incident response and audit tool for Kubernetes, giving enterprises the ability to...

'Unnecessary scaremongering' but still some work to be done Reports that the Home Office's Brexit app contains "serious vulnerabilities" that could expose the phone numbers, addresses and passport...

Mass-mail fail followed outfit's appearance at jobs fair BT Security managed to commit the most basic blunder of all after emailing around 150 infosec professionals who attended a jobs fair –...

Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors Waterfall for IDS provides hardware-enforced security that deploys transparently between OT networks and IDS...

Tales from the coal face as experts reflect on what can possibly go wrong on the job Analysis It has been six weeks since Coalfire's Gary Demercurio and Justin Wynn were nabbed in Dallas County,...

How a close-knit hero-worshiping culture can make reporting abusers difficult – and how help is at hand Cassie was studying for the computer security industry qualification CISSP when the...

Jetico releases BestCrypt Volume Encryption Enterprise Edition for Mac Jetico launched BestCrypt Volume Encryption – Enterprise Edition for Mac. Expanding on many years of Windows support, Jetico...