Sophos CEO: Pending Acquisition Part of Larger Services Shift

The pending $3.9 billion acquisition of Sophos by Thoma Bravo, announced this week, is part of a larger effort to transform how cybersecurity is achieved and maintained. Sophos CEO Kris Hagerman said as the threats organizations face increase in both … Continue reading Sophos CEO: Pending Acquisition Part of Larger Services Shift

Okta Enables Entire Organization to Participate in Cybersecurity Defense

At its Okta Showcase event, Okta launched Okta SecurityInsights to expand the base of individuals who can act on cybersecurity threats as they emerge. Joe Diamond, senior director of product marketing for Okta, said as it becomes more apparent that cy… Continue reading Okta Enables Entire Organization to Participate in Cybersecurity Defense

OASIS to Lead Cybersecurity Interoperability Initiative

At a Borderless Cyber event today, 18 cybersecurity vendors threw their weight behind a cybersecurity interoperability initiative being led by OASIS, an industry consortium that lately has taken the lead on several cybersecurity initiatives. Based on … Continue reading OASIS to Lead Cybersecurity Interoperability Initiative

Survey: Third-Party Code Proves Vulnerable

A recent survey of 307 IT professionals conducted Osterman Research on behalf of PerimeterX, a provider of cybersecurity tools for web applications, suggests there’s a lot of third-party code running on websites that no one can say with any certainty … Continue reading Survey: Third-Party Code Proves Vulnerable

IBM Adds Encryption Everywhere Capabilities to the Mainframe

IBM today unveiled a z15 mainframe that takes advantage of additional processing horsepower to create Trusted Data Objects that allow organizations to employ Privacy Passports technology to encrypt data across a hybrid cloud computing environment. Tru… Continue reading IBM Adds Encryption Everywhere Capabilities to the Mainframe

IBM Advances Cryptography Using Quantum Computers

IBM is gearing up to deliver quantum-based cryptography services on the IBM public cloud next year and is now making available a prototype of what it claims to be the first quantum computing safe enterprise-class tape ever developed. Announced at the … Continue reading IBM Advances Cryptography Using Quantum Computers

Report: Printers Remain Soft Security Underbelly

It’s long been established that printers attached to networks often are poorly defended and a weak link that security criminals exploit routinely. After all, the hard drives embedded in these devices often contain images of sensitive documents ranging… Continue reading Report: Printers Remain Soft Security Underbelly

VMware To Create Security Business Unit Post-Carbon Black Buy

VMware has signaled it plans to create a dedicated cloud security business unit in the wake of agreeing this week to acquire Carbon Black, a provider of an endpoint security service based on machine learning algorithms and Big Data analytics, for $2.1… Continue reading VMware To Create Security Business Unit Post-Carbon Black Buy

Box Shield Embeds Security Controls in Document Service

Box Inc. today moved to secure the content flowing through its namesake document sharing and management platform by making available Box Shield, a set of threat detection and governance controls that can be applied to any type of file. Jeetu Patel, ch… Continue reading Box Shield Embeds Security Controls in Document Service

WhiteHat Report: DevSecOps Adoption on the Rise

More organizations have embraced best DevSecOps practices, according to a report published by WhiteHat Security, a subsidiary of NTT Security focused on application security. However, the report also notes that although more vulnerabilities are being … Continue reading WhiteHat Report: DevSecOps Adoption on the Rise