ThreatQuotient integrates verified breach intelligence from Visa to strengthen payment data defenses

ThreatQuotient is integrating verified breach intelligence from Visa to enable customers to detect and protect against cyber attacks targeting payment data. The integration of the ThreatQ threat intelligence platform with Visa Threat Intelligence will provide incident responders and defenders of corporate networks with the context, customization and collaboration needed to transform critical threat data into actionable threat intelligence that can help identify breaches in advance. Visa Threat Intelligence is a subscription service delivered via the … More

Symantec acquires Javelin Networks to thwart growing number of active directory-based attacks

Symantec acquired Javelin Networks, a company that offers software technology to defend enterprises against Active Directory-based attacks. Microsoft Active Directory (AD) services have become a popular target for attackers, who use AD reconnaissance to discover the users, servers and computers in an enterprise network and then move laterally across the network using this information to carry out multi-stage attacks. Recently, multiple major advanced persistent threat (APT) campaigns have used AD credentials to move laterally in … More

Symantec acquires Appthority to enhance protection from mobile application vulnerabilities

Symantec acquired Appthority whose technology gives Symantec customers the ability to analyze mobile apps for both malicious capabilities and unsafe and unwanted behaviors, such as vulnerabilities, risk of sensitive data loss, and privacy-invasive actions. The acquisition of Appthority demonstrates Symantec’s commitment to securing modern (e.g. iOS, Android) endpoints and operating systems, as it brings innovation to its portfolio that addresses this security need. Last year, Symantec acquired Skycure, a Mobile Threat Defense (MTD) technology, that … More

Lookout puts the trust in zero trust with new post-perimeter security solutions

Lookout’s new approach to cybersecurity is designed to protect businesses as their employees work from outside the corporate perimeter. With integrations to Okta, VMware and other technology partners, Lookout brings security and compliance to today’s digital workforce without compromising productivity, privacy or user experience. Business apps and data have moved to the cloud and employees have gone mobile. For most businesses, this means their data may be accessed from devices they don’t know or trust, … More

Test IO introduces Bug Fix Confirmation, leveraging network of software testers to verify bug fixes

Test IO released a new product to help software teams verify that bugs are fixed in real-world conditions before software is released. Bug Fix Confirmation leverages test IO’s network of software testers to ensure that identified bugs are fixed so software releases go out on schedule. Verifying resolution of bugs is a standard step in the software development cycle and a bottleneck in release processes. It is troublesome for companies whose development teams have prioritized … More

ISACA to update CISA exam in 2019

ISACA’s Certified Information Systems Auditor (CISA) certification is being updated in 2019 to reflect the industry trends impacting the IT audit profession. Updated CISA review materials and training courses will be offered beginning in March 2019 to prepare candidates for the new version of the exam, which will take effect in June 2019. “Now in its 40th year, the CISA certification is more relevant than ever as effective deployment of technology and information systems is … More

HITRUST releases Threat Catalogue to improve risk management

HITRUST is releasing its Threat Catalogue to provide organizations with visibility into the threats and risks targeting their information, assets and operations. In addition to helping organizations understand the threats targeting their organization and their associated risks, the Threat Catalogue also identifies the technical, physical and administrative controls needed to address these risks. This improves an organization’s visibility into how it manages threats and better enables management to prioritize security programs and align budgets and … More

FireMon delivers hybrid cloud security with new visibility and orchestration capabilities

FireMon released the latest versions of the FireMon Security Manager and Lumeta Spectre platforms, which now deliver visibility into enterprise attack surfaces and network anomaly detection across on-premises, virtual and cloud environments. With this added functionality, FireMon enables enterprises to automate and orchestrate security operations, so they are more agile and responsive to business requirements. The migration of enterprise application workloads to public cloud environments has changed the way in which hybrid enterprises do business, … More

New TITUS machine learning capabilities enable confidence in identifying and protecting data

TITUS released TITUS Intelligent Protection, which adds machine learning advances to its TITUS Classification Suite for Windows and TITUS Illuminate solutions. With TITUS Intelligent Protection, customers can build and deploy a model based on company-specific data protection needs while leveraging machine learning to provide consistency and accuracy to data protection initiatives. TITUS Intelligent Protection enables TITUS customers to train their solutions to add an element of automation to the identification and classification of documents and … More

Covata’s Enterprise Security Console to provide visibility and control over sensitive data

Covata launched Enterprise Security Console that provides C-level executives, information owners, and IT administrators with a single pane of glass to discover and understand where sensitive data is stored and whether it is appropriately secured. By putting this information in context, Covata provides users with the ability to classify, protect, and control their information, reducing risk and improving the management of sensitive and regulated, unstructured data. Within a typical enterprise, unstructured data such as files … More