Please turn on your JavaScript for this page to function normally.
NIST selects Ivanti on Implementing A Zero Trust Architecture project

Ivanti announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate …

Radiant Logic participates in NIST’s NCCoE Zero Trust Architecture project

Radiant Logic announced that it has been selected by the National Institute of Standards and Technology (NIST)’s National Cybersecurity Center of Excellence (NCCoE) to …

Appgate participates in the implementation of a Zero Trust Architecture project with NCCoE

Appgate announced its participation in the Implementing a Zero Trust Architecture Project with the National Cybersecurity Center of Excellence (NCCoE) at the National …

zero
Manufacturers turning to zero trust to better secure their networks

In response to the 62% global increase in ransomware since 2019 (158% increase in North America) and over 40% of manufacturing firms suffering a cyberattack last year, Onclave …

Ping Identity adds its IAM solutions to the Department of Homeland Security CDM APL

Ping Identity announced two of its Identity and Access Management (IAM) solutions have been added to the Department of Homeland Security (DHS) Continuous Diagnostics and …

Google Cloud’s zero trust offerings help U.S. government organizations guard against cyberthreats

Google Cloud today announced new zero trust offerings for government, a set of services to help U.S. federal, state, and local government organizations implement zero trust …

Haystack Solutions CATA identifies cognitive abilities of individuals entering or upskilling in cybersecurity

Haystack Solutions introduced the Cyber Aptitude and Talent Assessment (CATA). It is the first such commercially available solution that is scientifically designed to identify …

Red Hat renews FIPS 140-2 security validation for Red Hat Enterprise Linux 8.2

Red Hat announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. The second FIPS …

Securiti partners with Snowflake to enable protection of sensitive data in the Data Cloud

Securiti has partnered with Snowflake to bring it’s advanced functionality also operating natively inside Snowflake Data Cloud. Securiti for Snowflake enables joint customers …

ADVA FSP 3000 ConnectGuard protects data against cyberattacks from quantum computers

ADVA launched an optical transport solution secured by post-quantum cryptography (PQC). The FSP 3000 ConnectGuard optical encryption solution now protects data against …

Thales’s voice biometric solution helps mobile operator call centres fight identity fraud

Thales announces a new voice biometric solution which is part of Thales Trusted Digital Identity Service Platform for onboarding and authentication. It meets the growing …

ISARA Advance Crypto Agility Suite addresses critical cryptographic blind spots

ISARA launched ISARA Advance Crypto Agility Suite, an enterprise solution that allows organizations to discover their cryptographic blind spots and equip them to take action …

Don't miss

Cybersecurity news