Search results for: zero trust

security platform

QuProtect offers protection against current and future quantum computing threats

QuSecure introduced its quantum orchestration platform, QuProtect, an end-to-end PQC software-based solution designed to protect encrypted communications and data with quantum-resilience using quantum secure channels. With QuProtect, for the first time organizations can leverage quantum resilient technology to help prevent today’s cyberattacks, while future-proofing networks and preparing for post-quantum cyberthreats. Leading experts, including Arthur Herman, senior fellow and director of the Quantum Alliance Initiative at The Hudson Institute, believe that a Cryptographically Relevant Quantum Computer … More


Mario Espinoza joins Illumio as CPO

Illumio announced the appointment of Mario Espinoza as Chief Product Officer (CPO). Espinoza has nearly two decades of experience in network, cloud, and data security, building innovative product suites for some of the world’s top security organizations. In this role, he will lead product strategy and the product management and engineering organizations to fuel continued innovation across the Illumio Zero Trust Segmentation product portfolio. Prior to joining Illumio, Espinoza served as the Vice President of … More


Talon Cyber Security appoints Admiral Mike Rogers to its Board of Advisors

Talon Cyber Security announced the appointment of Admiral Mike Rogers as Chairman of the company’s Board of Advisors. Rogers will help fuel the company’s go-to-market strategy, customer support and drive the continued adoption of Talon’s secure enterprise browser, TalonWork. “We are beyond thrilled to welcome Admiral Mike Rogers to the Talon family,” said Ofer Ben-Noon, co-founder and CEO, Talon Cyber Security. “Mike is the most insightful leader in the history of cybersecurity, and we could … More

security platform

Intertrust launches two features for enterprises aiming to protect data operations and IoT devices

Intertrust launched two major feature enhancements to its multi-party data interoperability platform, Intertrust Platform, that create trust and provide protection by bridging enterprise data operations and IoT devices with single pane of glass functionality. Intertrust Platform now includes two business-critical features for IoT and Web3.0 (Web3) environments: Explicit Private Networking (XPN) – Intertrust Platform XPN technology provides end-to-end security for data at rest as well as in transit from device to cloud and back. With … More

security platform

Skyflow releases MuleSoft Certified Connector to help customers protect sensitive data

Skyflow launched a new MuleSoft Certified Connector and joined the MuleSoft Technology Partner Program. Now, MuleSoft customers can leverage Skyflow’s Data Privacy Vault to protect and store sensitive information flowing through the MuleSoft gateway. Delivered as a developer-friendly API, Skyflow enables companies to build apps with the highest levels of data privacy, security, and compliance. Customers can use Skyflow’s Governance Engine to build and enforce fine-grained, event-driven, and condition-based policies to govern access to Skyflow’s … More


SecZetta and Active Cyber help clients optimize their third-party identity governance processes

SecZetta announced a new partnership with Active Cyber, a cloud consultancy, specializing in the implementation of Cloud-based Identity & Access Management (IAM) solutions. Active Cyber will resell the SecZetta Third-Party Identity Risk solution and provide consulting and implementation services to organizations seeking to implement a complete, zero-trust solution to their third-party non-employee challenges. Organizations in almost every vertical industry are relying on growing and increasingly diverse numbers of third parties to provide the elasticity they … More

security platform

NanoLock’s zero trust security solutions protect ICS devices and industrial machines

NanoLock Security announces their full suite of bespoke cybersecurity solutions for the industrial and manufacturing market. The first company to announce device-level protection solutions specifically for legacy and new industrial machinery and smart factory production lines, NanoLock’s industrial protection solutions has been in trials with customers in Europe and is now available worldwide. In the United States, NanoLock’s industrial solutions are available through World Wide Technology (WWT), a major American professional services integrator. NanoLock’s zero-trust … More

remote work

Remote work hazards: Attackers exploit weak WiFi, endpoints, and the cloud

Infoblox unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns stretch into a third year, organizations are accelerating digital transformation projects to support remote work. Meanwhile, attackers have seized on vulnerabilities in these environments, creating more work and larger budgets for security teams. 1,100 respondents in IT and cybersecurity roles in 11 countries – United States, Mexico, Brazil, United Kingdom, Germany, France, the Netherlands, Spain, … More


ONE ZERO Digital Bank selects AU10TIX to power its customer verification system and KYC process

ONE ZERO Digital Bank announced it has chosen AU10TIX to power its customer verification system and KYC (Know Your Customer) platform. The Bank of Israel, Israel’s central bank, gave ONE ZERO Digital Bank its stamp of approval to use AU10TIX’s technology. AU10TIX’s technology allows ONE ZERO Digital Bank to perform identity verification to new customers as part of the onboarding process as well as every activity that requires re-verification, such as making changes to a … More

zero trust

Where do federal agencies stand with zero trust implementation?

One year after the president’s executive order on improving the nation’s cybersecurity, federal agencies are making steady progress toward their zero trust security goals, according to a study commissioned by General Dynamics Information Technology (GDIT), a business unit of General Dynamics. But agencies also face several challenges and know there is still more work to do. The study surveyed 300 federal officials from civilian and defense agencies to understand the progress toward the cyber executive … More

week in review

Week in review: F5 BIG-IP RCE exploitation, URL spoofing flaws in Zoom, Google Docs

Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft patches Windows LSA spoofing zero-day under active attack (CVE-2022-26925) May 2022 Patch Tuesday is here, and Microsoft has marked it by releasing fixes for 74 CVE-numbered vulnerabilities, including one zero-day under active attack (CVE-2022-26925) and two publicly known vulnerabilities (CVE-2022-29972 and CVE-2022-22713). Attackers are attempting to exploit critical F5 BIG-IP RCE Researchers have developed PoC exploits for CVE-2022-1388, a critical … More


Votiro completes SOC 2 Type II compliance for Votiro Cloud

Votiro announced that it has successfully completed a Service Organization Controls (SOC) 2 Type II compliance audit for the entire Votiro Cloud product line, demonstrating the company’s commitment to maintaining all aspects of security. The independent audit was performed by Fahn Kanne Grant Thornton Israel, the sixth-largest Certified Public Accounting firm in Israel. Grant Thorton audited Votiro Cloud over the course of 6 months, completing the report on March 30, 2022 and ensuring SOC 2 … More