Cisco Snaps Up Kenna Security for Vulnerability Management

Cisco Snaps Up Kenna Security for Vulnerability Management

Cisco is set to acquire privately held Kenna Security in a deal designed to expand its SecureX platform with vulnerability management capabilities. Santa Clara-based Kenna Security provides risk-based vulnerability management capabilities alongside vulnerability intelligence to help organizations rapidly identify, prioritize and remediate cyber-risks. Cisco claimed the technology is increasingly important to organizations as work-from-anywhere policies expand the attack surface and increase security complexity. “Hybrid work is here to stay, and the increasing complexity of cybersecurity is…

Read More

VMware Enables Greater Security and Business Resilience for the Modern, Distributed Enterprise

VMware Enables Greater Security and Business Resilience for the Modern, Distributed Enterprise

News Detail At RSA Conference 2021, VMware will showcase how the company helps eliminate the complexity existing approaches with more interconnected security New threat landscape report details how attackers are successfully evading perimeter defenses PALO ALTO, Calif.–(BUSINESS WIRE)– At RSA Conference 2021, VMware security experts will highlight opportunities for continued evolution in cybersecurity … Mon, 17 May 2021 00:00:00 At RSA Conference 2021, VMware will showcase how the company helps eliminate the complexity existing approaches…

Read More

IoT helps make return-to-work safer

IoT helps make return-to-work safer

With more employees preparing to return to company offices at least part of the time, businesses have turned their attention to ensuring the safety of workers—given the ongoing Covid-19 pandemic. In some cases, Internet of Things (IoT) and networking technologies are playing a key role in these efforts. In fact, organizations might make decisions on when and how to bring workers back based on how well they can monitor them and their behavior using these…

Read More

Cybercrime Forum Bans Ransomware Activity

Cybercrime Forum Bans Ransomware Activity

A popular cybercrime forum claims to have banned all ransomware activity due to ideological differences and concerns over the amount of publicity that high-profile incidents are generating. Russian language forum XSS has contributed to the success of Ransomware as a Service (RaaS) groups like Netfilim, REvil, DarkSide and Babuk, by providing a platform to recruit new affiliates, according to Flashpoint. However, an administrator post late last week claimed that all sales of ransomware and affiliate…

Read More

Organisations are struggling to monitor remote employees – IT Governance UK Blog

Organisations are struggling to monitor remote employees – IT Governance UK Blog

I don’t think any of us would have thought in March 2020 that remote working would be as popular as it has become. The scepticism perhaps came from the hurriedness with which the measures were implemented, as many people worked from kitchen tables and between childcare responsibilities. Or maybe it stemmed from organisations’ historic reluctance to adopt remote working. Their reason for that is understandable: remote working makes it almost impossible to keep an eye…

Read More

Product spotlight on sports, stadiums and venue security

Product spotlight on sports, stadiums and venue security

Product spotlight on sports, stadiums and venue security | 2021-05-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Who owns AD security in your organization?

Who owns AD security in your organization?

Who owns AD security in your organization? | 2021-05-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Hardware security breaches are virtually guaranteed

Hardware security breaches are virtually guaranteed

Hardware security breaches are virtually guaranteed | 2021-05-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Mind The GAAP: Understanding the Importance of the CIS Controls

Mind The GAAP: Understanding the Importance of the CIS Controls

Given that attacks are only increasing and there needs to be greater efficacy in how companies protect themselves, let us reference how the financial industry has created and relies on a body of standards to address issues in financial accounting as a defined comparison for Information Security. To support this argument, there is a defined contrast between information security and Generally Accepted Accounting Principles. We’ll explore this relationship in more detail below. First, we’ll provide…

Read More

When it comes to your zero trust strategy, a modern approach to IGA is key

When it comes to your zero trust strategy, a modern approach to IGA is key

By Rod Simmons, vice president of product strategy, Omada The traditional perimeter approach to security was being dramatically altered long before COVID-19. However, the massive shift to a largely remote workforce ushered in as a result of the pandemic accelerated the need for a new approach. Securing access to a range of on-premises and cloud-based applications requires a transformation of identity and access management initiatives. The misguided trust we once had for users inside the…

Read More
1 3,803 3,804 3,805 3,806 3,807 4,264