Topic: cybersecurity

RSA 2019: Synopsys’ Polaris Software Integrity Platform, Sysdig’s Cloud-Native Intelligence Platform, WhiteHat security partnership program and more

RSA Conference is taking place this week in San Francisco with a number of companies and thought leaders coming together to tackle the latest and greatest cybersecurity threats. “Some say it’s impossible to stay ahead of cybersecurity threats. We disagree. We’ll always be here as your go-to resource for exchanging ideas, learning the latest trends … continue reading

WebAuthn becomes an official recommended web standard

The Internet is one step closer to a passwordless future. The World Wide Web Consortium (W3C), along with the FIDO Alliance, announced that Web Authentication (WebAuthn) specification is now a web standard. WebAuthn is a core component of the FIDO Alliance’s FIDO 2 set of specifications, which aims to provide easier authentication services to mobile … continue reading

Microsoft tackles enterprise cybersecurity with Azure Sentinel and Threat Experts

Microsoft wants to improve security teams’ ability to detect and respond to threats at scale. The company announced Microsoft Azure Sentinel and Microsoft Threat Experts to reduce noise, false alarms, and time-consuming tasks. “Cybersecurity is about people. The frontline defenders who stand between the promise of digital transformation and the daily reality of cyber-attacks need … continue reading

DeepLocker demonstrates how AI can create a new breed of malware

While artificial intelligence is changing our world for the better, if put in the wrong hands, cybercriminals can figure out how to use the technology in a negative way. To stay ahead of the curve, IBM Research has announced it has been studying the evolution of this technology in order to predict new potential threats … continue reading

SD Times news digest: Yale looks at modern cybersecurity challenges, LG AI research lab and GitHub Desktop 1.3

Yale University is releasing a new report on the challenges and problem areas of cyber risk in today’s modern world. The report is based off of discussions from the second annual Yale Cyber Leadership Forum in April. The forum looked at the divide between the law, technology, and business communities as well as focused on … continue reading

SD Times news digest: Splice Machine data platform now available on Azure, Mozilla’s mobile test pilot and Xen Project Hypervisor 4.11

Splice Machine has announced its data platform for intelligent apps is now available on Microsoft Azure. According to the company, this will give users an option to use the platform to deploy on premise, on AWS and now on Azure. The data platform is designed to help developers easily build and deploy predictive apps without … continue reading

FIDO Alliance and W3C announce stronger web authentication standard

The FIDO Alliance and the World Wide Web Consortium (W3C) have reached a major milestone in their effort towards bringing stronger and simpler web authentication to users globally. The organizations have announced the  Web Authentication (WebAuthn) standard is advancing to the Candidate Recommendation stage, the last step before the final approval of a web standard. … continue reading

Security Operational Centers are experiencing an upward trend, report says

As the volume of security threats rises, so is the efficiency of Security Operational Centers (SOC) used to combat against security breaches. A newly released report from Micro Focus found a 12 percent improvement in SOC maturity, the biggest improvement over the last five years. The report is based on the company’s Security Operations Maturity … continue reading

Guest View: CEOs — The biggest shadow IT threat?

Chances are high that your business is home to shadow IT. The practice of using unsanctioned software on company devices isn’t done out of malice. It’s quite the opposite — users are turning to unapproved applications like chat apps, task managers, or collaboration tools in an effort to be more productive. While the intentions of … continue reading

Cyberextortion: A growing Internet problem

“If you’re gonna commit a crime,” as “Slick Willie” Sutton said when asked why he robbed banks, “That’s where the money is.” Also known as “Willie the Actor” for his ability to disguise himself, Sutton stole an estimated $2 million during his 40-year robbery career. Modern-day cyber criminals have adopted this approach to digital extortion … continue reading

SD Times news digest: SEC approves guidance, Google Android Enterprise Recommendation and SnapLogic updates cloud platform

The Securities and Exchange Commission (SEC) has unanimously voted to approve a statement that assists public companies in preparing disclosures about cybersecurity risks and incidents. This addresses the importance of cybersecurity policies and procedures. “I believe that providing the Commission’s views on these matters will promote clearer and more robust disclosure by companies about cybersecurity … continue reading

SD Times news digest: Red Hat Decision Manger 7, Apache NetBeans 9.0 beta, and new cybersecurity task force

Red Hat has released Decision Manager 7, its low-code development solution for business rules. Decision Manager is designed to allows citizen developers to build applications that automate business decisions. “It’s entirely possible to create a fully working application purely by creating the business rules in Decision Manager,” said Phil Simpson, JBoss product marketing manager at … continue reading

1 2 3 15
HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!