Security News & Reviews
Chris Preimesberger, September 24, 2018 2:37 PM
More Security News
As quantum computing power grows, so too does the risk to currently deployed cryptographic algorithms, which is why DigiCert, Gemalto and ISARA are now working together to prepare for the future.
As part of its Crypto Week series of announcements, Cloudflare debuts a new service to help organizations cryptographically secure time.
Building on technology gained via the 2017 acquisition of Komand, Rapid7 is now rolling out new security orchestration and automation capabilities in its product portfolio.
After five months on job, Fidelis' new CEO Nick Lantuh sets a path for future growth, as the company expands its threat hunting capabilities.
Cyber-security at financial services firms is improving, according to Accenture, with organizations reporting they are blocking more cyber-attack breach attempts in 2018 than in 2017.
With an increasing number of employees working from coffee shops, airports and home, and the cost of breaches increasing the security concerns created by perimeter-based VPNs, organizations are looking closer at alternatives such as SDPs, which use a zero-trust paradigm to overcome these issues.
The Kace Systems Management Appliance now benefits from two-factor authentication security and extends system management out to IoT devices.
VIDEO: Gee Rittenhouse, SVP and GM of Cisco's Security Business Unit, discusses how his company is extending cyber-security capabilities across all aspects of the business.
AT&T, Sprint, T-Mobile and Verizon have come together in the Mobile Authentication Taskforce in a bid to provide consumers with a stronger form of authentication than simply relying on an SMS passcode.
Twistlock set up a honeypot with vulnerable applications to see what would happen and was quickly attacked by automated botnets looking to exploit unpatched vulnerabilities.
After years of being best known as a remote access technology vendor, Bomgar will be renamed BeyondTrust later this year after it completes the acquisition of privileged access management vendor BeyondTrust.
The four-phased approach is designed to quickly identify incidents, mitigate damage and restore services, the company says.