FireEye updates Email Security with new threat detection and evasion defenses
In addition to the executive impersonation protection capabilities, FireEye Email Security – Server Edition incorporates several other new features designed to combat emerging threat vectors while enhancing performance. The features are available in the latest version of FireEye Email Security – Server Edition (8.2).
Avnet advances IoT security with Azure Sphere Starter Kit
Avnet Azure Sphere MT3620 Starter Kit supports prototyping of IoT implementations using Microsoft’s Azure Sphere, an end-to-end solution for creating secured, connected Microcontroller (MCU) devices. The production-ready module is the fastest and easiest way to equip IoT endpoint devices to be secure, ensuring that developers can move from prototype to production.
Threat modelling joins DevSecOps processes through automation
Created by Continuum Security, IriusRisk 2.0 is a tool that enables threat modelling at scale and provides follow-up throughout the development process via integration with developer workflows and security testing tools.
New Neurotechnology MegaMatcher 11 product line includes major enhancements
Neurotechnology released the new MegaMatcher 11 line of biometric solutions, cloud technologies and software development kits (SDKs). The latest versions include algorithm enhancements that improve accuracy, speed and interoperability across multiple biometric modalities: fingerprint, face, iris, voice and palmprint – any of which can be used alone or in combination.
Ledger unveils new Nano X hardware wallet
The Ledger Nano X has a Bluetooth feature that connects through the Ledger Live Mobile app, which allows users to connect the device to their smartphone, providing mobility without sacrificing security. It can store up to 100 crypto assets, which is six times more capacity than the Ledger Nano S, and includes an improved interface with a larger screen.
New technology protects from GNSS spoofing attacks
Regulus Cyber is solving the GNSS spoofing attacks threat affecting the automotive, aviation, maritime, and mobile industries with a technology applicable both as a fortified GNSS Receiver, capable of detecting spoofing attacks, and at the chip level, allowing mobile phones, cars and IoT devices to receive GNSS spoofing protection.