HITRUST adds new components to its Third-Party Risk Management Methodology

HITRUST, a leading data protection standards development and certification organization, announced a major release of its HITRUST Third-Party Risk Management (“TPRM”) Methodology that introduces numerous new components including an Inherent Risk Questionnaire, Rapid Assessment, and Trust Score. Also announced today are enhancements to the HITRUST Assessment XChange (the “Xchange”) Manager platform to fully integrate the TPRM Methodology. This enables the XChange Manager platform to automate the TPRM process from the vendor qualification through the organization’s … More

ZeroNorth’s platform enhancements drive security into DevOps

ZeroNorth, the industry’s first provider of risk-based vulnerability orchestration across applications and infrastructure, announced new platform capabilities that enable customers to more effectively build security into the software development life cycle (SDLC) and evaluate, prioritize and respond to risk based on business context. These enhancements are driven by new integrations with software pipeline and enterprise security platforms, and advanced filtering and analytics capabilities. The ZeroNorth platform enables organizations to embrace critical digital transformation initiatives, such … More

Intel’s product updates drive AI system development and deployment from cloud to edge

Intel welcomed the next wave of artificial intelligence (AI) with updates on new products designed to accelerate AI system development and deployment from cloud to edge. Intel demonstrated its Intel Nervana Neural Network Processors (NNP) for training (NNP-T1000) and inference (NNP-I1000) — Intel’s first purpose-built ASICs for complex deep learning with incredible scale and efficiency for cloud and data center customers. Intel also revealed its next-generation Intel® Movidius Myriad Vision Processing Unit (VPU) for edge … More

Ping Identity provides the identity verification solution for myColorado

Ping Identity, a pioneer in Intelligent Identity, announced that the Ping Intelligent Identity platform provides the identity verification solution for the State of Colorado’s official mobile application, myColorado, which contains the new Colorado Digital ID. The Digital ID enables Coloradans to display a digital version of their driver license on their smartphones for proof of identification, age and address within Colorado. This could eventually remove the need to carry a physical identification card while drastically … More

Sontiq updates the user interface for its IdentityForce Mobile App

Sontiq, an enterprise high-tech security and identity protection company, announced an updated user interface for its IdentityForce Mobile App, which also includes comprehensive mobile device scanning and related alerts to help ensure the safety and security of individuals and families. By applying a key component of its Mobile Defense Suite to the IdentityForce Mobile App, consumers now can take advantage of a new feature, Mobile Attack Control, which monitors and alerts IdentityForce Mobile App users … More

MITRE Engenuity to strengthen critical infrastructure

MITRE has launched a tech foundation to advance its mission of solving problems for a safer world by working with the private sector to strengthen critical infrastructure. The foundation provides MITRE a new pathway to work with industry, academia, and other organizations beyond its work with the federal government. MITRE Engenuity is a distinct, not-profit company with a separate board of directors and private funding. “MITRE has a history of transforming cybersecurity standards, improving aviation … More

F-Secure integrates its cyber security software into Zyxel’s residential gateways and devices

Zyxel Communications, a leading provider of secure broadband networking, Internet access and connected home products, announced it has teamed up with F-Secure to integrate the company’s award-winning cyber security software into Zyxel’s residential gateways and devices. The integration of F-Secure’s software with Zyxel’s world-class hardware enables service providers to deliver secure high-speed broadband and WiFi connectivity to their subscribers while protecting them from a growing array of cyber attacks targeting their connected home devices. Zyxel … More

Devo and Demisto deliver increased visibility and shortened investigation and incident response times

Devo Technology, the data analytics company that unlocks the full value of machine data for the world’s most instrumented enterprises, announced a product integration with Demisto, a Palo Alto Networks company and leader in security orchestration, automation, and response (SOAR). The integration delivers increased visibility and shortened investigation and incident response times. By providing a better workflow, Devo and Demisto empower analysts and improve the effectiveness of the Security Operations Center (SOC). Together, Devo and … More

The Chertoff Group and Dragos providing risk management for industrial organizations

The Chertoff Group and Dragos announced the formation of a unique alliance that will provide a holistic approach to cybersecurity risk management for industrial organizations seeking to protect critical infrastructure environments from today’s constantly evolving cyber threats. The Chertoff Group is combining its policy intelligence, technology expertise and vast experience communicating threats to executives with Dragos’ industrial control system (ICS) expertise and best-in-class asset identification, threat detection and response platform. This alliance between two of … More

Indegy and Owl Cyber Defense address secure sharing of OT data with IT security systems

Indegy, a leading provider of security solutions for industrial control system (ICS) and operational technology (OT) environments, and Owl Cyber Defense Solutions, the global market leader in data diode network cybersecurity solutions, announced a partnership to provide the safe unification of OT security data with IT monitoring systems. The tested and certified joint Indegy-Owl solution gives customers the confidence of knowing that their OT network is physically inaccessible from the external network while being monitored … More

Trend Micro enhances protection for industrial orgs

Trend Micro, a global leader in cybersecurity solutions, announced its complete smart factory security solutions, designed to provide enhanced visibility and protection for embattled industrial control system (ICS) environments. The solutions will secure across all layers of Industry 4.0, mitigating this growing area of cyber risk to keep operations running. Gartner predicts that approximately 49 billion IoT devices will be connected in 2021 and that number will continue to increase for the foreseeable future. Even … More

Jamf unveils Jamf Protect, an enterprise Mac endpoint protection solution

Jamf Protect leverages native Apple security tools and on-device analysis of macOS activity to create customized telemetry that gives enterprise security teams visibility into their macOS fleet and the ability to respond and block identified threats. Jamf Protect is now generally available to commercial organizations in the United States. “Because of Jamf’s Apple-first and Apple-only approach, Jamf Protect is unique in how it provides a granular view of native macOS security capabilities and an analysis … More