Security News
Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls...
Baker's dozen pwned by tricksy attack Enterprise iPhone users in India have been targeted through a sophisticated and highly targeted attack run through bogus Mobile Device Management (MDM) servers.…
NCP engineering provides security for the Industrial Internet of Things (IIoT) with its central management system, NCP Secure Enterprise Management. Providing visibility across all components and...
AT&T on Tuesday said it would acquire San Mateo, Calif.-based threat management and intelligence firm AlienVault for an undisclosed sum. read more
Bomgar announced it will acquire Avecto. Avecto’s Defendpoint technology combines privilege management and application control to protect endpoints by making admin rights removal simple and...
As businesses migrate to digital channels to improve their product offerings, promote business and enhance customer and employee engagement, their online presence and attack surface simultaneously...
A unified response to cyberattacks and other emergencies can limit damage and greatly improve the recovery process. The Critical Event Management method is one approach to handling these incidents.
A new initiative by the Cyber Readiness Institute aims to promote best cybersecurity and vendor risk management practices to smaller enterprises. RiskRecon founder and CEO Kelly White offers his...
Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to help developers get things...
Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this increased support and take...