Smart cities are exposed to old-school threats

Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart city devices and ultimately found 17 zero-day vulnerabilities, some of which cou… Continue reading Smart cities are exposed to old-school threats

Which SD-WAN product should enterprises choose?

Adoption of Software Defined Wide Area Network (SD-WAN) has reached an inflection point and nearly every distributed business is deploying, evaluating, or planning to implement an SD-WAN as part of its IT vision. To help enterprises understand the meri… Continue reading Which SD-WAN product should enterprises choose?

There’s a global divide in how organizations assess cyber risk

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and tailored scanning and prioritizing computing resources based on business crit… Continue reading There’s a global divide in how organizations assess cyber risk

Photo gallery: Black Hat USA 2018

Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall and the Arsenal. Featured companies: ZeroFOX, LogRhythm, Qualys, Rapid7, Irdeto, Whitesource, Bitdefender, Splunk.
The post Photo gallery: Black Hat USA 2018 appe… Continue reading Photo gallery: Black Hat USA 2018

Ziften adds AV to the Zenith endpoint protection platform to stop attacks

Ziften announced its Zenith endpoint protection platform now includes AV protecting all enterprise endpoints from known and unknown targeted attacks. Ziften helps enterprises simplify endpoint protection plus visibility. Zenith is the cyber security pl… Continue reading Ziften adds AV to the Zenith endpoint protection platform to stop attacks

Bugcrowd University to provide hands-on training for security researchers

Bugcrowd announced the launch of Bugcrowd University to educate and empower the crowd with the latest skills and methodologies. The first advanced program of its kind, Bugcrowd University provides researcher education and training to improve the state … Continue reading Bugcrowd University to provide hands-on training for security researchers

Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications

Intertrust Technologies and Jscrambler announced a jointly-sourced product suite App Shield 360 that provides a set of application shielding solutions for both native and JavaScript applications that includes: Jscrambler to provide leading JavaScript w… Continue reading Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications

Qualys and IBM X-Force Red help orgs identify, fix most critical vulnerabilities

Qualys announced that IBM X-Force Red will leverage the Qualys Cloud Platform as part of its X-Force Red Vulnerability Management Services (VMS). As part of an expanded relationship, X-Force Red will deploy the Qualys Cloud Agent and Qualys Cloud Apps … Continue reading Qualys and IBM X-Force Red help orgs identify, fix most critical vulnerabilities

Only 8% of orgs have effective DevSecOps practices

92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so – a staggering capability gap exposed in the new, global data report commissioned by Checkmarx. The study spotlights … Continue reading Only 8% of orgs have effective DevSecOps practices

IBM Security now opens network of four secure testing facilities globally

IBM Security announced X-Force Red Labs, a network of four secure facilities dedicated to testing the security of devices and systems including consumer and industrial IoT technologies, automotive equipment, and Automated Teller Machines (ATMs). IBM X-… Continue reading IBM Security now opens network of four secure testing facilities globally