Basil Security unveils security policy enforcement solution

Basil Security, the Zero Trust Operations company, announced general availability of the world’s first policy-as-code platform that provides stateful security policy enforcement over arbitrary code execution, APIs, and data access. Basil can be used to prevent errors, block insider cyberattacks, and guarantee accountability. “Preventing errors and insider cyberattacks beats detecting and remediating security problems after the fact,” said Ron Herardian, Basil Security’s CEO. “Multi-party approvals, non-repudiation, and audit time travel set new standards for cybersecurity, … More

Tripwire expands coverage and support for DevOps environments

Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organizations, announced at RSA Conference expanded coverage and support for DevOps environments. The new vulnerability scanning and compliance functionality of Tripwire for DevOps includes additional container registries and Amazon Machine Image (AMI) types, and supports more of the tools and processes used by organizations to integrate security into DevOps. Tripwire for DevOps is a software-as-a-service (SaaS) solution that provides configuration assessment … More

Capsule8 expands leadership team with key executive hires

Capsule8, the only company providing high-performance attack protection for Linux production environments, announced additions to its executive team, appointing Jim Bandanza as Chief Operating Officer/CRO and Kelly Shortridge as Vice President of Product Strategy. The announcement was made at RSA Conference 2019, where Capsule8 was a finalist in the RSAC Innovation Sandbox Contest. The company earned the finalist designation for its unique approach to protecting Linux production workloads at massive scale, whether containerized, virtualized or … More

CSA launches compliance assessment program for cloud service providers

The Cloud Security Alliance (CSA) announced STAR Continuous Self Assessment, the first release of an evolving continuous-compliance assessment program for cloud services that gives cloud service providers (CSPs) the opportunity to align their security validation capabilities with cloud security compliance and certification on an ongoing basis. CSA STAR Continuous is an integral part of the CSA STAR program, the industry’s leading cloud governance and compliance program that enables organizations to increase their levels of assurance … More

Comcast acquires BluVector, developer of AI-powered cybersecurity technology

Comcast announced it has acquired BluVector, a company that uses advanced artificial intelligence and machine learning to provide cybersecurity protection to companies and government agencies. With a proprietary machine-learning engine, BluVector detects, analyzes, and contains a wide range of sophisticated cyber-threats including “fileless malware,” zero-day malware and ransomware. The two companies will work together to grow BluVector’s existing business and also collaborate on the development of new cybersecurity technologies. “BluVector is a global leader in … More

Gemalto expands cloud-based Hardware Security Module solutions

Gemalto, the world leader in digital security, announced the availability of three new cloud-based Hardware Security Module (HSM) services, HSM On Demand for CyberArk, HSM On Demand for Hyperledger and HSM On Demand for Oracle TDE. Each service is available through the SafeNet Data Protection on Demand platform, a marketplace of cloud-based HSM, encryption and key management services that easily integrates with most widely used cloud services and IT products to protect data wherever it … More

NTT Security Corporation acquires WhiteHat Security

NTT Security has signed a definitive agreement to acquire privately-owned WhiteHat Security, the leading application security provider committed to securing applications that run enterprises’ businesses. Post-acquisition, WhiteHat Security will operate as an independent, wholly-owned subsidiary of NTT Security. As a result of this acquisition, NTT Security will provide the world’s most comprehensive end-to-end cybersecurity solutions. Together, working hand-in-hand, the two organizations will address enterprise security needs that range from IT infrastructure to critical business applications, … More

RSA helps customers address digital transformation risks

RSA announced at the RSA Conference new enhancements to its award-winning Integrated Risk Management platform, RSA Archer, to help customers fundamentally transform their risk management function. As organizations rapidly evolve and embrace digital technologies to provide their organizations a competitive advantage, new forms of risk are created. Due to the connected nature of the modern enterprise, these digital risks challenge the status quo for risk and cybersecurity teams, third-party engagements, business continuity, data privacy, and … More

Armor Scientific makes authentication as easy as walking into a room

Armor Scientific, a cybersecurity company purpose built to manage the identity of everything, announced the company is emerging from stealth mode at the RSA Conference. Simultaneously, the company released the Armor Platform, a converged hardware token and middleware suite aimed at law enforcement, first responders, government, military, finance, healthcare and transportation. A combination of wearable GPS, biometric hardware, and patent-pending cryptographic and blockchain-enabled middleware, the Armor Platform removes the complexity around identity governance, making authentication … More

Sysdig enhances its Cloud-Native Intelligence Platform

Sysdig announced new features for its Cloud-Native Intelligence Platform focused on helping enterprises transition to containers, reduce security risks, increase compliance posture, and improve DevOps efficiency. With this announcement, Sysdig is the first cloud-native visibility solution to extend compliance metrics and the Kubernetes audit events to a monitoring dashboard. Furthermore, compliance data will be available by default for all Sysdig customers, whether they are using Sysdig Monitor, Sysdig Secure, or the entire Sysdig Platform. With … More