Security News
Despite the 49% of organizations in the report who said they are completing an initial risk assessment before granting access to third parties, these assessments are typically focused on the security controls the organization has in place or the organizational risk score. A third-party organization may pass a risk assessment and be in compliance one day, but an unexpected threat to business operations may push it out of compliance the next.
Unbound Security announced that Unisys has deployed Unbound CORE to strengthen its security with centralized management of code signing and cryptographic keys. Unisys, the global IT solutions company, chose Unbound CORE to unify the key management and security policies across the organization - both for security standards and for efficiency.
Focusing on enhancing security, system management capabilities, and improving data collaboration, DSM 7.0 is a large step forward for the Synology NAS and SAN product lines. Further, Synology is rolling out both hybrid and cloud-only products for C2, adding a new password manager, directory as a service, cloud backup, and secure file sharing solutions.
Sequitur Labs introduced its EmPOWER Service, a new cloud-based offering that securely monitors, manages and updates IoT devices to address technical, IP, supply chain and business-process challenges faced by IoT developers and manufacturers dealing with the acceleration of Artificial Intelligence at the network edge. Sequitur's EmPOWER Platform introduces Trust-as-a-Service to edge devices.
Byos announced the launch of the Byos Industrial μGateway, a plug-and-play, edge security product that provides secure connectivity for Internet of Things devices and legacy infrastructures. Delivering zero trust security through micro-segmentation, the Byos Industrial μGateway also provides secure remote access for IoT devices through its unique Secure Lobby feature, enabling remote monitoring and management of industrial systems with no network or endpoint exposure.
The report examines the impact that the pandemic and increase in remote work had on identity and access management in the enterprise, as well as the implementation of identity-focused security strategies. Four out of five participants believe that while identity management used to just be about access, it's now mostly about security.
The Business Logic Attack Definition Framework sets the stage for shared understanding and knowledge among vendors, cybersecurity professionals and customers who are proactively tackling an increasing number of malicious bot threats. Once the attack stages for a scalper bot attack were confirmed, Netacea analysed the tactics, techniques and processes of other types of bot attacks and captured all automated bot threats and their lifecycles in a series of comprehensive kill chains.
Sherweb announced it is joining forces with LogMeIn to offer its partners LastPass, a password management solution. LastPass is an all-in-one solution that offers single sign-on and multi-factor authentication to provide managed service providers with the visibility and control over every access point of their clients' businesses.
A third party could present a softer target, creating an opportunity for threat actors to move from that network to their primary target. A third party can actually become the primary target if it holds the sensitive data that threat actors want.
Cyber risk management solutions provider Brinqa this week announced that it received $110 million in growth capital from private equity firm Insight Partners. Bootstrapped and founder-backed since 2009, the company helps organizations gain a better view of cyber risk across their resources, through the seamless integration of security sources into a unified knowledge graph.