Security News

Podcast: Why Identity Access Management is the New Perimeter
2020-06-02 13:00

With the proliferation of cloud in enterprise environments, the concept of "Identity" today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud by Rapid7, about how identity access management is rapidly changing - and how businesses can keep up.

New BitSight capabilities enable more effective third-party cyber risk management
2020-06-02 01:00

BitSight announced several new, innovative capabilities within its BitSight for Third-Party Risk Management solution that provide intelligent recommendations, operational guidance, and risk prioritization to enable more effective third-party cyber risk management. "Third-party ecosystems are expanding rapidly and organizations of all shapes and sizes struggle to create effective risk management programs," said Dave Fachetti, executive vice president of Strategy.

Quest Software announces new KACE offerings for endpoint management
2020-05-20 12:00

Quest Software, a global systems management, data protection and security software provider, announced new feature updates for several of its KACE solution offerings. KACE, a solution-set available from the Quest Unified Endpoint Management business, empower organizations to take control of their network-connected devices and automate endpoint management tasks to ensure license compliance and a secure network.

FireEye Cloudvisory: Control center for multi-cloud security management
2020-05-14 03:00

FireEye, the intelligence-led security company, announced the availability of FireEye Cloudvisory, a control center for cloud security management across any security environment - private, public and hybrid. Fully integrated into the broader FireEye cloud security portfolio, Cloudvisory now offers customers instant deployment across their cloud infrastructures, and further capabilities in security analytics through FireEye Helix and advanced threat detection through FireEye Detection On Demand.

Hexnode integrates with Okta to add new features to the identity and access management solution
2020-05-12 23:00

Hexnode the emerging global leader in the UEM market has recently announced incorporating new integration with Okta a popular cloud-based identity and access management solution. The integration adds more flexibility to the solution in the area of identity and access management functionalities.

Qualys provides vulnerability management for customers of Azure Security Center
2020-05-11 02:15

Qualys, a pioneer and leading provider of cloud-based security and compliance solutions, announced that Qualys Container Security is immediately available and Qualys Vulnerability Management will be available within a month in Microsoft Azure Security Center. Any discovered vulnerabilities are reported to Azure Security Center as recommendations, including the ability to create playbooks for one-click remediation with no software to deploy or update.

Download: 'Coronavirus Cyber Security for Management' Template for CISOs
2020-05-05 09:57

As a result, CIOs and CISOs face a double challenge on the cyber risk front - apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than ever. The Definitive Corona Cyber Security for Management PPT template provides security executives with an easy and intuitive tool to present management their existing security posture and translate it to tangible business risk, as well as making the case on how to address gaps if such exist.

Download: 'Coronavirus Cyber Security for Management' Template for CISOs
2020-05-05 09:57

As a result, CIOs and CISOs face a double challenge on the cyber risk front - apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than ever. The Definitive Corona Cyber Security for Management PPT template provides security executives with an easy and intuitive tool to present management their existing security posture and translate it to tangible business risk, as well as making the case on how to address gaps if such exist.

COVID-19 Contact Tracing Apps: Effective Virus Risk Management Tools or Privacy Nightmare?
2020-05-04 14:43

The success of contact tracing apps will then depend on the overall active uptake by users, and whether the big data analysts have got their figures right. "Numerous vulnerabilities have been discovered like BlueFrag, which affected IOS and Android." He also warns, "Contact tracing apps need to be regularly tested for vulnerabilities and critical updates must be deployed immediately. These apps must also be prohibited from activating smart assistants. People must limit the location settings to run only when approved and when in use."

Fortanix Self-Defending Key Management Service now running on Microsoft Azure
2020-05-04 00:30

Fortanix, a Runtime Encryption company, announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect private data in the public cloud. Fortanix provides a cloud-native data security solution including key management, hardware security module, tokenization, secrets management and privacy preserving analytics built on Azure confidential computing infrastructure.