Security News

Trend Micro Research Uncovers Major Flaws In Leading IoT Protocols.

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today warned organisations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). Trend Micro’s new report, co-branded with Politecnico di Milano, The Fragility of Industrial IoT’s Data Backbone, highlights the growing threat of industrial espionage, denial-of-service and targeted attacks...

Read more
Ingram Micro Chooses Nyotron’s PARANOID For Its Endpoint Security.

Nyotron, provider of the industry’s first OS-Centric Positive Security solution to strengthen endpoint protection, announced today that Ingram Micro, a leading global provider of technology solutions serving 160 countries with $46B in revenue, has chosen Nyotron's PARANOID to secure its approximately 34,000 associates and 5,000 servers. “We’ve realized that chasing threats, whether with signatures, machine learning or manual threat hunting, will continue to be a challenge,” said Tom Peck, Ingram Micro global chief information and...

Read more

LastPass by LogMeIn, a leader in password management, has revealed their ranking of the most and least secure UK online retailers ahead of the holiday shopping season. With Black Friday and Cyber Monday around the corner, the analysis has revealed that retailers still have work to do to encourage strong password security and support two-factor authentication (2FA). LastPass identified the top 10 UK retailers by 2017 e-commerce sales and scored them on their security offerings....

Read more
image of a cyber secuirty

Tomorrow the UK government will identify ‘operators of essential services’ that will be required to comply with the security and incident reporting requirements set out in the European Security of Network and Information Systems (NIS) Directive. The Directive requires the identified businesses and service providers to ensure their technology, data and networks are secured and cyber resilient. The NIS Directive ties into the UK government’s National Cyber Security strategy of ‘Defend, Deter and Develop’. Under...

Read more

Today, Dashlane announced a partnership expansion with Chubb, the world's largest publicly traded property and casualty insurance company. Building on a successful North American partnership, Chubb cyber business policyholders in Europe will now receive a complimentary Dashlane Premium license as part of their policy benefits, with other regions available soon. The innovative partnership is part of Chubb’s Cyber Services program, helping policyholders identify and mitigate key cyber exposures. According to the U.S. National Cyber Security...

Read more
Claranet Logo

A lack of knowledge and an overreliance on manual change processes is leading many businesses to jeopardise the security of their cloud deployments, global technology services provider Claranet warns today. The warning follows the launch of a report published by McAfee this week, which found that the average business has approximately 14 improperly configured IaaS instances running at any given time and roughly one in every 20 AWS S3 buckets are left wide open to...

Read more
Tufin Logo

Tufin®, the market-leading provider of Network Security Policy Orchestration solutions, announced the release of Change Window Automation and Policy Commit to enable organisations to automate planned changes during designated change windows and respond immediately to urgent firewall policy change requests. Change Window Automation improves operational efficiency and avoids disruption to the business during normal working hours, with full trust that changes will be committed according to security policy in designated off-hour change windows. Policy Commit...

Read more
Fidelis Logo

As cybercriminals and nation-states continue to improve the sophistication of attacks that bypass traditional preventive defences, organisations must evolve their security defences to reduce dwell time. Fidelis Cybersecurity (Fidelis) – a leading automated detection and response provider — asked cybersecurity leaders, security architects and security analysts about the evolution of their cyber defence strategies, including post-breach detection and response, as well as threat hunting. Fidelis interviewed over 580 security professionals from around the globe to...

Read more
Kaspersky Lab Logo

Kaspersky Lab is launching the fourth international industrial Capture the Flag (CTF) security competition and inviting ethical hackers, known as whitehats, from across the world to test the security of smart devices and industrial systems. Any release of a new piece of technology is usually followed by waves of hacking attempts, as cybercriminals search for vulnerabilities. However, unlike blackhats, who are looking to exploit systems and new technologies for illegal purposes, whitehats are working towards...

Read more

The world’s most advanced security product for IoT devices has been unveiled today at the IoT Solutions World Congress. Developed by the UK company, Crypto Quantique, it has the capabilities required to become the foundational security product for every IoT device in the world. The foundational technology consists of the world’s first quantum driven secure chip (QDSC) on silicon which, when combined with cryptographic APIs, provides highly scalable, integratable, easy-to-implement and seamless end-to-end security for...

Read more
Page 21 of 23 1 20 21 22 23