ISARA updates tools to protect sensitive data and systems from the quantum threat

ISARA, the leading provider of agile quantum-safe security solutions, announced new and updated tools that make it easy to test and implement crypto-agility and quantum-safe cryptography directly into existing systems and begin protecting IT infrastructure from emerging threats. The advent of quantum computing poses an existential threat to the classical encryption that safeguards everything from personal data to critical infrastructure. ISARA’s technology enables migration to quantum-safe cryptography that’s seamless and cost-effective with a standards-based approach … More

Sectigo releases Zero-Touch deployment email encryption and digital signing solution

Businesses worldwide have reported $12 billion in fraud losses since 2013 as a result of 78,000 BEC attacks (FBI). To address this cybersecurity risk and increase compliance with industry and government regulations, Sectigo (formerly Comodo CA), the world’s largest commercial Certificate Authority and a leader in web security solutions, has released the industry’s first Zero-Touch deployment email encryption and digital signing solution to use the Secure/Multipurpose Internet Mail Extension (S/MIME) protocol. Sectigo Zero-Touch S/MIME enables … More

Ascom launches new platform to fully digitize healthcare

Ascom, a global solutions provider focused on healthcare ICT and mobile workflows, announces the release of its next-generation Unite Platform Server, offering improved architecture and scalability to deploy and run the complete suite of Unite software. Designed to offer improved scalability and architecture, Unite Platform Server will simplify deployments in larger enterprise healthcare environments that run Unite clinical orchestration software, reducing hardware needs and enabling new capabilities from consolidated integrations. As hospitals unify IT environments, … More

A10 Networks ships 100 Gbps NFV solution for 5G secure application services

A10 Networks announced that it has shipped the industry-leading 100 Gbps virtual machine for 5G secure application services with the Thunder Convergent Firewall (CFW). The solution has already been adopted by a major telco provider in the Middle East for its 5G environment. The 100 Gbps virtual machine provides the fastest throughput available in the market and helps customers transition to an agile, scalable and software-defined network function virtualization infrastructure (NFVi) required for the commercial … More

PCI SSC accepting applications for the Qualified PIN Assessor Program

PCI SSC is accepting applications for the Qualified PIN Assessor (QPA) Program. The QPA Program will enable security professionals to perform assessments using the PCI PIN Security Requirements and Testing Procedures (PCI PIN Security Standard). QPAs will be specifically trained in security controls that need to be validated as being in place to protect the transmission and processing of personal identification numbers (PINs). The new instructor-led training will cover the requirements for the secure management, … More

Dtex Systems platform enhancements providing user behavior intelligence and insider threat detection

Dtex Systems, the leader in insider threat intelligence and detection, announced that significant enhancements are being added to the Dtex Advanced User Behavior Intelligence Platform. These will allow customers to extend visibility over system administrators and other privileged users’ actions, providing the most accurate understanding available of how this groups’ activities and behaviors impact risk. The company also announced that platform scalability improvements are allowing enterprise and government customers to rapidly extend insider threat detection … More

Armorblox uses deep learning to solve challenges with email security and data loss

Armorblox announced that it has built the world’s first natural language understanding (NLU) platform for cybersecurity, analyzing sensitive information in emails and documents, and providing a new way to intelligently detect, alert and protect against identity-related attacks and data loss. Closing Series A funding with $16.5 million led by General Catalyst, Armorblox finally provides a way for organizations to protect against people-hacking. Armorblox will showcase the new solution at RSA Conference, March 4-8 in San … More

Netsurion releases EventTracker EDR, protecting against costly data breaches

Netsurion, a leading provider of managed network connectivity, security, and compliance solutions, announced EventTracker EDR, the industry’s first managed endpoint threat detection and response (EDR) solution that is part of a unified SIEM platform and delivered as a managed security service. EventTracker EDR is optimized for small and midsized businesses, which represent 58 percent of all malware attack victims. EventTracker EDR, the next generation of endpoint protection, is effective in blocking against both known malware … More

STEALTHbits Technologies release real-time threat detection and response platform

STEALTHbits Technologies, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announced the release of StealthDEFEND v2.0, their real-time threat detection and response platform. This release capitalizes on the momentum in the Active Directory (AD) market. This momentum has been building for well over a decade as STEALTHbits has aggressively developed new technologies, acquired talent from organizations like BeyondTrust and Quest Software, as well … More

K2 Cyber Security releases new platform protecting hybrid clouds against sophisticated attacks

K2 Cyber Security announced the general availability of its cloud workload security platform, featuring two fundamental innovations that together deliver comprehensive protection for hybrid cloud environments. K2’s Optimized Control Flow Integrity (CFI) technology ensures an application executes only as designed, enabling an industry first – real-time attack detection with no false positives, regardless of an application’s patch status. Its dynamic, workload identity-based micro-segmentation prevents the lateral movement of threats. As part of its launch, K2 … More releases platform to bridge the cybersecurity-insurance gap, the industry-first provider of cyber resilience solutions, emerged from stealth with the debut of a unique platform that enables insurance carriers to automate and enhance their cyber insurance solutions, while increasing the security of their insureds. Cyber resilience is the combination of risk mitigation and accelerated recovery to reduce the total impact of a cyber incident. Whereas cybersecurity stops or limits the scope of an attack, cyber insurance addresses financial loss and recovery costs. … More

ObserveIT launches ObserveIT 7.7, increasing data exfiltration prevention capabilities

ObserveIT, the leading insider threat management platform with more than 1,900 customers around the world, announced the launch of its newest solution, ObserveIT 7.7. The latest release enhances ObserveIT’s insider threat management capabilities to provide a modern approach to data loss prevention (DLP). It provides increased data exfiltration prevention capabilities and further protects against insider threats, specifically reducing the risk of data loss while enabling streamlined investigations. Data breaches are on the rise globally and … More