ImmuniWeb Discovery diminishes application security complexity and operational costs

ImmuniWeb, a global application security testing and security ratings company, is thrilled to announce the launch of ImmuniWeb Discovery that now offers: continuous discovery of external digital web assets actionable security ratings of asset hackability and attractiveness continuous web security testing, best practices and compliance monitoring (PCI DSS, GDPR) continuous monitoring of data leaks, source code exposure, phishing and domain squatting monthly subscription starting at $99 per organization ImmuniWeb Discovery substantially diminishes application security complexity … More

Telia Carrier implemets RPKI, reducing the risk of accidental route leaks

Telia Carrier has announced, that it has implemented RPKI – a technology that validates and secures critical route updates or BGP announcements on its #1 ranked global Internet backbone. BGP is the central nervous system of the Internet and RPKI reduces the risk of accidental route leaks, or even hijacks, which can result in critical outages or fraudulent traffic manipulation. Internet connectivity has become an indispensable part of our everyday lives and the networks at … More

Accenture supports Exxaro to digitally transform its business and unlock new revenue streams

Accenture has collaborated with Exxaro, one of South Africa’s leading coal producers, to help digitally transform its business and unlock new revenue streams by managing the migration of its SAP solutions, and other centrally-run applications used by Exxaro business units, to Microsoft Azure. This supports Exxaro’s ambition to establish a secure, agile, cost-effective and scalable platform that will improve business processes and continuity. Accenture created a cloud transformation strategy for Exxaro that defined the business … More

Open source breach and attack simulation tool Infection Monkey gets new features

Guardicore, a leader in internal data center and cloud security, unveiled new capabilities for its Infection Monkey that make it the industry’s first Zero Trust assessment tool. Added features extend the functionality of the already successful Infection Monkey, a free, open source breach and attack simulation tool used by thousands to demonstrate and analyze their environments against lateral movement and attacks. The latest version of Infection Monkey enables both enterprise security leaders and network engineers … More

Irdeto launches Trusted Home enabling CSPs to secure the entire smart home beyond the router

Consumer demand for IoT devices is growing rapidly as they look to make the most of connectivity and the smart home. However, the increase in IoT devices also increases the number of security vulnerabilities and creates challenges for communication service providers (CSPs) and consumers alike around control of the smart home. To address these challenges, Irdeto has launched Trusted Home which enables CSPs to secure the entire smart home beyond the router, increase ARPU by … More

TSYS Authentication Platform helps companies fight synthetic and account takeover fraud

TSYS announced a new authentication product that provides unprecedented real-time verification of customer identities. The new offering, the TSYS Authentication Platform, relies on customer experience data collected from direct cardholder touchpoints and integrates into TSYS clients’ existing authentication systems. TSYS Authentication Platform is available in Europe and will be launched in North America in 2020. The new product is designed to verify that a person is who he or she claims to be, reducing application, … More

HITRUST issues guidance for relying on work of internal audit departments in CSF assessments

HITRUST, a leading data protection standards development and certification organization, released updated guidance for placing reliance on the results of previously performed audits, assessments, and inspections. These policy and methodology updates create opportunities for greater assessment efficiency and customer cost savings. HITRUST has historically afforded two opportunities for External Assessors (formerly referred to as HITRUST CSF Assessors) to rely on the results of previously performed control testing, one being Inheritance of the results of other … More

New Razberi features use deep packet inspection to monitor video quality and camera security

Razberi Technologies has extended its Razberi Monitor solution with new video health monitoring features. Razberi leverages its patent-pending deep packet inspection technology to assure security professionals that their cameras are providing secure and reliable audio and video streams. Razberi’s latest software automatically reboots cameras and sends alerts when problems are detected. Razberi Monitor provides complete system health and cyber monitoring solutions for video surveillance systems. Razberi Monitor integrates video health with award-winning Razberi CameraDefense for … More

Easy NX Connect for Egnyte enables fast and secure file sharing

Fujitsu Computer Products of America, the established leader in document imaging, announced a new integration with the FUJITSU fi-7300NX document scanner and Egnyte. Easy NX Connect for Egnyte is a convenient software license that enables organizations to scan directly to Egnyte via a quick tap and scan into a secure, sharable workflow. Easy NX Connect for Egnyte includes NFC authentication and direct integration into Egnyte’s Enterprise File Sharing and Content Governance platform. In conjunction with … More

Bank Mayapada chooses NICE Actimize to update its AML compliance programs

NICE Actimize, a NICE business and the leader in autonomous financial crime management, has been chosen by PT Bank Mayapada Internasional, Tbk, Jakarta, Indonesia, to launch full-scale improvements within its financial crime operations with anti-money laundering compliance and investigation management solutions that employ artificial intelligence and machine learning technology. To more effectively meet the needs of its regulators, Bank Mayapada will implement an array of components from NICE Actimize’s Autonomous Anti-Money laundering portfolio, including Suspicious … More