Security News
Juniper Networks updates JATP Appliances to prioritize cyber threats from any security source Juniper Networks released new offerings as part of its Juniper Networks Advanced Threat Prevention...
Plus: State-backed hacks now need permission from a judge On the same day that certain types of British state-backed hacking now need a judge-issued warrant to carry out, GCHQ has lifted the veil...
It's like a turducken of screw-ups Roundup As America prepares for Thursday's Thanksgiving rituals of turkey, football, and awkward conversations with extended family, three organisations are...
Cequence Security announces application security platform to stop bot attacks Cequence ASP is an application security platform that provides a scalable defense against the growing number of bot...
As the world adapts to GDPR and puts more attention on personal privacy and security, Europe’s top information security professionals still have doubts about the industry’s ability to protect...
DFLabs open framework enables integration of SOAR and security tools DFLabs launched a new version of the IncMan SOAR platform that provides an open integration framework for customizing and...
Massive hacker playground can be spun up on the cheap A group of Italian researchers have developed a blueprint for a massive virtualized enterprise network to allow for large-scale security tests...
Data Theorem introduces automated API discovery and security inspection solution Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at...
XML twiddling in .docx files can lead to lock and loading dodgy JavaScript, we're told A Microsoft Word security hole involving embedded videos can be potentially exploited to smuggle malicious...
IBM rolls out cybersecurity operations center on wheels IBM Security launched the mobile Security Operations Center, capable of traveling onsite for cybersecurity training, preparedness, and...