
DB Networks partners with Cyphort and Security On-Demand
Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network …

Ping Identity enhances its Federated Access Management technology
Ping Identity updated its Federated Access Management technology. Designed to displace legacy Identity and Access Management infrastructures, this latest release includes …

Google offers free DDoS protection to independent news sites
Google (i.e., Alphabet) has created a free DDoS protection service to help independent news sites, sites focused on human rights and on election monitoring withstand DDoS …

FBI subpoenaed Carnegie Mellon University for Tor-using suspect’s IP address
A court order in the case of U.S. vs Brian Farrell, a man charged with conspiracy to distribute illegal drugs while he was allegedly an administrator of the Silk Road 2.0 …

Not all data breaches are created equal
1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …

Insecure APIs allow anyone to mess with Nissan LEAF electric car
A vulnerability in the mobile app used to interact with Nissan LEAF, a popular electric car, can be exploited by remote, unauthenticated attackers to switch the car’s AC …

A third of IT managers admit to hacking
A high percentage of IT personnel admitted to not following the same security protocols they are expected to enforce, according to Absolute Software. Of those surveyed, 33% of …

Internet of Evil Things: The growing risks of connected devices
As risk and concern around connected Internet of Things (IoT) devices continues to grow, resources and visibility into such connected devices have stagnated despite the …

8 in 10 IT pros believe believe their data is safer in the cloud
Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud …

Correlate real-time data from mobile devices across the enterprise
OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …

Utilize any data source to see attacks on the inside
Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data …

Siemplify brings military intelligence capabilities to enterprise security operations
Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management