Security News

Neustar Unified Identity: Transforming customer data management
2021-03-25 03:45

Neustar announced the launch of Neustar Unified Identity, end-to-end identity management solution that enables resolution of offline to online identifiers by responsibly connecting people, location, and device data. "Our goal with Unified Identity is to bring simplicity and order back to customer data management helping our clients to better manage data between departments and partners using a single, unassailable source of truth," said Michael Schoen, Senior Vice President and General Manager of Marketing Solutions at Neustar.

Gartner: Top security and risk management trends for 2021
2021-03-23 19:31

The 8 top trends cited will enable rapid reinvention, including the skills gap, cybersecurity mesh and identity-first security. At Tuesday's Gartner Security & Risk Management Summit, Gartner Research Vice President Peter Firstbrook discussed eight critical trends for security and risk-management leaders in his keynote address.

CentralNic partners with JISC to supply and support UK domain registry management software
2021-03-23 00:30

CentralNic has been awarded a significant project by Jisc. The project is to supply and support registry management software to underpin the domain name infrastructure of some of the UK's most critical domain extensions, including.

CISA Warns of Security Flaws in GE Power Management Devices
2021-03-22 20:39

The U.S. Cybersecurity & Infrastructure Security Agency is warning of critical-severity security flaws in GE's Universal Relay family of power management devices. GE's UR devices are the "Basis of simplified power management for the protection of critical assets," according to the company.

Taliware launches Biombeat, an identity-management software developer toolkit
2021-03-19 03:00

Taliware announced that its identity-management software developer toolkit is now available. By integrating the Taliware SDK with their applications, mobile app developers can use Taliware's patented Biombeat to access ECG-based biometric verification, to enable passwordless, location-based authentication.

Okera adds the ability to delegate data access policy management to the Okera Dynamic Access Platform
2021-03-19 01:30

Okera announced it has added the ability to delegate data access policy management, an important functionality for enabling Distributed Stewardship, to its Okera Dynamic Access Platform. As data volumes continue to soar, large, distributed enterprises require Distributed Stewardship to enable data stakeholders, who are the experts in their respective disciplines and domains, to ensure effective governance and compliance with data privacy regulations, including HIPAA, GDPR, CCPA/CPRA, and more.

Vulnerability Management Firm Vulcan Cyber Raises $21 Million
2021-03-17 14:40

Vulnerability remediation orchestration provider Vulcan Cyber today announced that it has raised $21 million in Series B funding. The new funding, Vulcan Cyber says, will help it expand its platform with new vulnerability remediation solutions for both cloud and applications, as well as meet demand for its SaaS solution.

A New Paradigm in Data Security: Insider Risk Management
2021-03-17 13:00

Insider Risk Management builds a framework around the new paradigm of "Risk tolerance," aiming to give security teams the visibility and context around data activity to protect that data, without putting rigid constraints on users. The answer is a new category of data security technology: Insider Risk Management.

HD Moore Banks $5M Funding for Rumble Asset Management Startup
2021-03-16 20:49

Network and asset discovery provider Rumble this week announced that it has raised $5 million in VC funding. Founded by H.D. Moore, who is best known for creating Metasploit and who also started Rapid7's Project Sonar, Rumble officially launched in October 2019, after a six-month beta period.

Securing a hybrid workforce with log management
2021-03-16 06:00

A centralized log management tool for monitoring a hybrid workforce infrastructure can deliver significant value in a short period, making it fundamental to building security into the hybrid workforce. User access event logs provide visibility into when and where people log their devices into a network.