1Kosmos Passwordless Identity Package provides a scalable passwordless authentication solution
1Kosmos announced the availability of its Passwordless Identity Package (PIP). The 1Kosmos PIP provides enterprises a risk-free, scalable passwordless authentication solution. …
How do we decide whether or not to trust AI systems?
Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make …
Can zero trust kill our need to talk about locations?
As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …
Wind River’s enhancements deliver cybersecurity and anti-tamper protection
Wind River announced security enhancements to Wind River Studio, a cloud-native platform for the development, deployment, operations, and servicing of mission-critical …
TCG’s security guide verifies the trustworthiness of each end point
IT administrators and manufacturers can now secure enterprise computing, with the latest specification from the Trusted Computing Group (TCG). This new guide verifies the …
How to deal with ransomware attacks
Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help …
Shujinko’s free automation software helps auditors and clients streamline SOC 2 preparation and readiness
Shujinko announced the availability of free automation software to help auditors and their clients streamline SOC 2 audit preparation and readiness. This free solution …
CoreStack compliance and governance solution now available in the Microsoft Azure Marketplace
CoreStack announced the availability of its CoreStack AI-powered, multi-cloud compliance and governance solution in the Microsoft Azure Marketplace, an online store providing …
Hackers are leveling up and catching healthcare off-guard
Remember when ransomware operators promised last year not to attack hospitals under siege from COVID-19? Unfortunately, that didn’t happen: hospitality, entertainment, …
CyberSaint adds NLP-backed crosswalking functionality to its CyberStrong platform
CyberSaint announced the addition of patented, Natural Language Processing (NLP)-backed crosswalking functionality to its CyberStrong platform. Organizations, regardless of …
BIO-key releases MobileAuth, a touchless biometric authentication app
BIO-key International introduced its new mobile app, BIO-key MobileAuth with PalmPositive the latest among over sixteen strong authentication factors available for …
Thales and Senetas unveil quantum resistant network encryption solution
Thales and Senetas have collaborated to launch the world’s first quantum resistant network encryption solution, capable of protecting customer data (at speeds up to 100 Gbps) …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)