Security News

As a result, CIOs and CISOs face a double challenge on the cyber risk front - apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than ever. The Definitive Corona Cyber Security for Management PPT template provides security executives with an easy and intuitive tool to present management their existing security posture and translate it to tangible business risk, as well as making the case on how to address gaps if such exist.

As a result, CIOs and CISOs face a double challenge on the cyber risk front - apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than ever. The Definitive Corona Cyber Security for Management PPT template provides security executives with an easy and intuitive tool to present management their existing security posture and translate it to tangible business risk, as well as making the case on how to address gaps if such exist.

The success of contact tracing apps will then depend on the overall active uptake by users, and whether the big data analysts have got their figures right. "Numerous vulnerabilities have been discovered like BlueFrag, which affected IOS and Android." He also warns, "Contact tracing apps need to be regularly tested for vulnerabilities and critical updates must be deployed immediately. These apps must also be prohibited from activating smart assistants. People must limit the location settings to run only when approved and when in use."

Fortanix, a Runtime Encryption company, announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect private data in the public cloud. Fortanix provides a cloud-native data security solution including key management, hardware security module, tokenization, secrets management and privacy preserving analytics built on Azure confidential computing infrastructure.

The combination further establishes Syndigo as a leading provider of end-to-end product content creation, management and syndication capabilities, and enhances its digital asset management and customization capabilities. "The addition of Kwikee to Syndigo's end-to-end integrated solution ensures that our clients will continue to have the most complete and flexible range of tools to manage the entire product experience - from Digital Asset Management, to Product Information Management, to Syndication and Analytics - globally," said Syndigo CEO Paul Salay.

Network operators, integrators and software vendors have joined forces to create Leitstand, an open-source community that aims to increase the efficiency of developing, buying and running network management systems for next generation carrier networks. It will provide the tools needed to operate the underlying infrastructure in a disaggregated telecoms network, including zero-touch provisioning of infrastructure, inventory management, operational visibility of network elements, alarm monitoring, fault diagnosis and software version management.

A leading provider of powerful and affordable IT management software, announced subscription-based pricing for the majority of its on-premises IT operations management products. The new pricing model provides IT professionals and their organizations an additional option alongside the company's perpetual licensing model, and offers greater flexibility with their operational expenses and predictability for their budgets-two things that are front and center for IT leaders in today's uncertain times.

Env0, a developer of Infrastructure-as-Code management software, introduced the public beta of the env0 platform, the first cloud management platform built to enable self-service with complete governance and cost control in AWS, Azure and Google Cloud Platform. "Shifting to microservices and cloud native architectures has made cloud applications much more complicated, increasing developer frustration with DevOps bottlenecks," said Ohad Maislish, CEO and co-founder of env0.

To address these challenges, cloud providers have introduced support for Bring Your Own Key that allows organizations to encrypt data inside cloud services with their own keys while still continuing to leverage the cloud provider's native encryption services to protect their data. Even with BYOK, keys still exist in the cloud providers' key management service.

MobileIron, the company that introduced the industry's first mobile-centric, zero trust platform for the enterprise, announced that it has entered into a cooperation agreement with Altai Capital Management, which owns approximately 7% of MobileIron's outstanding shares. "Having been a long-term investor in MobileIron for many years, Rishi knows the business well and we are confident that he will bring a valuable and distinct perspective to our Board," said Simon Biddiscombe, CEO and Board member, MobileIron.