Cyber Security
IBM Cybersecurity Hub to Mitigate APAC Cyberattacks (TWA)
In a move that has the potential to revolutionize cybersecurity training, IBM virtually inaugurated its Cyber Range and IBM Security Command Center. The center located in Bengaluru... More
5 Cybersecurity Spending Areas to Evaluate (CFO)
As computing environments change and bad actors switch tactics, most organizations will need to increase or redirect their investment in cybersecurity.... More
Ransomware Victims are Paying Up – But Then the Gangs are Coming Back for More (ZDNet)
Cybersecurity experts warn against paying ransoms - this is why.... More
Want Real Cybersecurity Progress? Redefine the Security Team (TNS)
If businesses want to see progress on the cybersecurity front, they’ll need to change this state of affairs by making security a collective responsibility.... More
Five Reasons Why Hackers Do Not Want You to Consolidate Your Security Toolset (Edgescan Blog)
While cost reduction and tool management bandwidth concerns might be why you are considering Security Tool Consolidation – the Hacker has a different agenda. They are counting on... More
Equinix, Cisco Deliver End-to-End Virtual Firewall Security (Interconnections)
Applications and remote environments give rise to the need for flexible and agile security. A virtual firewall is a network security solution designed for cloud environments or whe... More
Pivot to a Secure Cloud with Automation (TCS Blog)
Today’s enterprises want to rapidly adopt multi-cloud to accelerate their digital transformation goals. However, moving to a multi-cloud alone cannot be a silver bullet unless yo... More
Edgescan Sets Partnership With Manicode
Edgescan announced a partnership with Manicode Security, the secure coding education company. With a combination of lecture, security testing demonstration, and code review, Manico... More
Riscure Introduces Riscuberry for Embedded Systems Security Training
The IoT target Riscuberry serves multiple purposes. Riscuberry is not only an up-to-date target for embedded security training but also a training target for FI and SCA. Riscuberry... More
Will the Metaverse Usher in a Universe of Security Challenges? (Security Intelligence)
As more human activity takes place in virtual spaces, the challenges around security will become more important. The shift from today’s VR to tomorrow’s metaverse is mainly abo... More
Palo Alto Networks Detects ‘Nebula’ Threats With OS, Hardware Upgrade (SDxCentral)
Palo Alto Networks introduced the latest version of its PAN-OS software, dubbed Nebula, for sophisticated, zero-day attack detection along with new additions to its hardware firewa... More
Irdeto Watermarking Completes Cartesian Robustness Test (RTN)
Digital platform cybersecurity prover Irdeto’s TraceMark forensic watermarking embedding and detection technology has successfully completed a thorough Farncombe Security Audit W... More
Security Strategies Evolve While Spending Flatlines (CD)
Surprisingly, IT security spending has been flat for several years, recent data from Gartner show, but that doesn't mean organizations are standing still. Investment in new securit... More
Cybersecurity and Forensic Accounting Join Forces to Combat Criminals
Not a day goes by without breaking news of a sophisticated white collar crime scheme perpetrated against a corporation, government entity or individual. In the era of digital trans... More
archTIS, Threat Protect Announce Partnership
archTIS and Threat Protect announced a new partnership to add archTIS’ attribute-based access control (ABAC) information security solutions to Threat Protect’s comprehensive ra... More
Microsoft Introduces Cyber Signals to Help Defend Against Cyber Threats (TR)
The new informative reports will evaluate the tactics, techniques and strategies used by cybercriminals to help security, information and privacy officers, and their teams, to impl... More
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware (Security Intelligence)
Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryp... More
Palo Alto Networks Makes the Business Case for DevSecOps (SDxCentral)
Organizations can increase employee productivity and earn a better return on their security investments by shifting cloud security left at the infrastructure and application layer,... More
SAP, Yale University to Empower the Next Generation of Cybersecurity Professionals
SAP announced a new agreement with Yale University’s Jackson Institute for Global Affairs to foster early cybersecurity talent and promote diversity in the field. (more…)... More
CIO Involvement in Security Grows as CEOs Target Risk Reduction (CD)
Half of CIOs are prioritizing security management this year, as CEOs push for IT and data security upgrades to reduce corporate risk, according to a new survey. The majority of IT ... More