Gartner, Forrester name Retarus for Email Security
The information logistics firm was listed as one of the twelve most important providers of email security services in the world by Forrester Research.
Jamf extends Apple expertise through security firm buyout
Slack tackles balance between productivity and security
CrowdStrike launches threat-scoring platform
DDoS attacks on the rise despite taking a summer break
New code-signing solution released by Venafi
New research highlights third party risks facing organisations
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
Fortinet integrates security fabric with Alibaba Cloud
The combination of technologies will provide extended security visibility and control from the data center to the cloud.
Understanding VMware in just 4 minutes
We look at the companies history and key technology solutions.
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.
Banking malware grows 50% while cryptominers decline – Check Point
The report’s findings are based on data drawn from Check Point’s between January and June 2019, highlighting the key tactics cyber-criminals are using to attack businesses.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
Thales launches new Gemalto Digital ID wallet
Digital ID wallet is designed to only share with third parties information that the citizen is willing to share.
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
Email attacks affecting employees’ personal lives - Barracuda
The survey includes responses from 660 executives, individual contributors and team managers serving in IT-security roles in the Americas, EMEA, and APAC.
ForgeRock launches open-source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
ESET: Ignoring human element in cyber safety a mistake
"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right."
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Broadcom set to own Symantec’s enterprise security business for $10.7B
"M&A has played a central role in Broadcom's growth strategy and this transaction represents the next logical step in our strategy following our acquisitions of Brocade and CA Technologies," says Broadcom CEO
Venafi announces guarantee for no certificate-related outages
Eliminating certificate-related outages within complex, multi-tiered architectures can feel like an impossible effort.
Popular enterprise printers riddled with security risks
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
Nintex bolstered by independent security report
Nintex Workflow Cloud’s security controls are up to scratch, with not one single instance where a security control wasn’t working, or not in place.
F5 Networks' BIG-IP load balancer product vulnerable to attack
Organisations that use F5 Networks BIG-IP load balancer should immediately check their configurations to ensure they are protected from potentially serious security issues.
Genetec shows impressive growth, says IHS Markit
IHS has named Genetec one of the fastest-growing access control software manufacturers in the world, according to the latest IHS Report.