Search results for: open sources

Dawn Cappelli

OT security: Helping under-resourced critical infrastructure organizations

In this Help Net Security interview, Dawn Cappelli, Director of OT-CERT at the industrial cybersecurity company Dragos, talks about the OT security risks critical infrastructure organizations are facing, offers advice on how they can overcome obstacles that prevent them improving their cybersecurity posture, and explains how the recently set up OT-CERT she’s heading can help asset owners and operators of industrial infrastructure. [The answers have been lightly edited for clarity] Supply chain risks are compounded … More


IOTech Edge XRT 2.0 simplifies the development of time-critical OT applications

IOTech released Edge XRT 2.0, an open software platform designed for time-critical and embedded OT applications at the industrial IoT edge. Edge XRT 2.0 greatly simplifies the development of OT applications and enables faster time-to-market for new edge systems. It is hardware agnostic, independent of the silicon provider (Intel or ARM) and operating system. Users have complete deployment flexibility. They can deploy it as a native application, containerized and/or into a virtualized environment. With its … More

company report

Cloudflare One Partner Program enables companies of all sizes to adopt zero trust strategies

Cloudflare announced the new Cloudflare One Partner Program. The Program presents a new way for the channel to integrate and extend Cloudflare One, a cloud-native solution with global network scale, now with direct paths for partners from full enablement to robust incentives. By building on Cloudflare’s comprehensive Zero Trust, Network-as-a-Service, and Cloud Email Security offerings, the Cloudflare One Partner Program enables partners to provide the architecture needed to keep today’s organizations secure while speeding up … More

security platform

Mitek Verified Identity Platform protects customers against identity theft

As consumers transact more business online than ever, identity verification has become essential to safe digital access. Now Mitek is making it possible for companies to protect customers’ digital experiences from the moment they open an account through their entire journey. Almost 50% of U.S. citizens were victims of some form of identity theft between 2020 and 2022, according to the National Council on Identity Theft Protection. Most common forms of identity fraud included account … More

security platform

GitGuardian announces new features to help developers reduce risks of exposure

GitGuardian announced a series of new features to address developer experience in securing the software development lifecycle. To reduce the risks of exposure of secrets in the software development lifecycle, GitGuardian is betting on what it has framed as the Application Security Shared Responsibility Model. The company is helping security teams partner with development teams to remediate swaths of existing vulnerabilities and prevent ones in the future. By getting the developer experience right, GitGuardian is … More


OpenText Cloud Editions 22.2 helps businesses prepare for the next wave of disruption

OpenText announced Cloud Editions 22.2 featuring new capabilities and innovations that enable businesses to be agile, responsive, and resilient in a time when disruption is accelerating. As a global leader in information management, OpenText is powering and protecting businesses to achieve the information advantage by being intelligent, connected, and responsible. “Businesses need to be prepared for the next wave of disruption,” said Mark J. Barrenechea, OpenText CEO & CTO. “Understanding that information is exponential and … More

Office 365

Fake voicemail notifications are after Office365, Outlook credentials

A phishing campaign using fake voicemail notifications has been and is still targeting various US-based organizations, in an attempt to grab employees’ Office365 and Outlook login credentials, Zscaler warns. The campaing seems to be a repeat of a previous, similar one, and targets security solution providers, software security developers, supply-chain organizations in manufacturing and shipping, healthcare and pharmaceutical firms, and the US military. Zscaler was one among the targeted organizations, which allowed them to analyze … More

security platform

Cloudflare One enhancements strengthen zero trust security for organizations

Cloudflare announced several new capabilities for Cloudflare One, its zero trust SASE platform, making it the only cloud-native zero trust solution with global network scale. New features for Cloudflare One include sophisticated email security protection, data loss prevention tools, cloud access security broker (CASB), and private network discovery. Now, any organization can use Cloudflare One for a comprehensive and deeply-integrated zero trust security and networking solution to protect and accelerate the performance of devices, applications, … More

security platform

Portnox unveils new cloud-native tool to help midmarket businesses simplify network security

Portnox released a cloud-native Terminal Access Controller Access Control Server (TACACS+) solution to help midmarket businesses manage network device administration and access management across increasingly distributed networks. “We are dedicated to simplifying network security so midmarket IT teams have the same level of visibility and control as their enterprise IT counterparts with unlimited budgets and resources,” noted Denny LeCompte, CEO at Portnox. “Building out a cloud-native TACACS+ solution was a natural next step for our … More

security platform

Trend Micro VicOne strengthens connected vehicle cybersecurity

Connected cars provide plenty to entice threat actors, with more than 400 million predicted to be on the roads globally by 2025. Trend Micro announced VicOne, dedicated security for the electric vehicles and connected cars of today and tomorrow. This innovation is the latest addition to Trend Micro’s long history of incubating successful business ideas to bring the best security offerings to market. “At Trend Micro, we are driven by the desire to secure the … More


API security warrants its own specific solution

Application programming interfaces (APIs) enable developers to quickly and easily roll-out services but they’re also equally attractive to attackers. This is because they can provide ready access to back-end systems and sensitive data sets. What makes these attacks so interesting is how they are executed: unlike a traditional “hack,” an API attack doesn’t hinge on there being something wrong with the API. Rather, attackers can legitimately use the way an API functions against it and … More


ADVA Ensemble SaaS MANO accelerates rollout of virtualized services

ADVA launched the NFV management and orchestration (MANO) platform delivered through a software-as-a-service (SaaS) model. ADVA’s Ensemble SaaS MANO simplifies and accelerates uCPE deployments, ensuring faster time to revenue for communication service provider (CSP) and enterprise customers. Hosted in the public cloud and managed by ADVA or its partners, the offering provides access to critical management tools while delivering significant cost savings. It enables CSPs and enterprises to harness the opportunities of virtualization without major … More