Please turn on your JavaScript for this page to function normally.
building blocks
New infosec products of the week​: January 27, 2017

Prevent DNS-based data exfiltration and detect malware Delivered as a service, Infoblox ActiveTrust Cloud addresses the needs of global enterprises with a mobile workforce and …

people
Infosec certification and the talent shortage crisis

As more enterprises aspire to create future workspaces and harness the benefits of a mobile workforce that leverages cloud platforms, there’s a greater need to implement …

explode
New infosec products of the week​: January 20, 2017

Twistlock 1.7 comes with new runtime defense architecture Twistlock unveiled a new runtime defense architecture for its Twistlock 1.7 container security platform that enables …

research
New infosec products of the week​: January 13, 2017

Denim Group enhances ThreadFix platform Denim Group, a leading independent application security firm, today announced the latest version of ThreadFix, the company’s …

Bitdefender BOX
New infosec products of the week​: January 6, 2017

Fortress Cyber Security launches Fortress UTM Fortress UTM provides intrusion detection and prevention, firewall and anti-virus for all Wi-Fi and IoT/Ethernet attached …

keyboard
New infosec products of the week​: December 16, 2016

Ixia enhances network assessment and monitoring platform Ixia’s Hawkeye, which proactively generates and analyzes synthetic network and application traffic to assess how …

keyboard
New infosec products of the week​: December 9, 2016

Thales releases advanced encryption solutions for secure docker containers Thales released new capabilities for its Vormetric Data Security Platform. These advances extend …

sign
New infosec products of the week​: December 2, 2016

Trend Micro offers Deep Security as a Service on AWS Marketplace Trend Micro announced the availability of Trend Micro Deep Security as a Service on AWS Marketplace. This new …

Deepquest
Next level red teaming: Working behind enemy lines

The term “hacker” calls forth both positive and negative mental pictures, but I can bet that there are not many people, even in the infosec community, to whom the …

Waterfall BlackBox
Seal the integrity of your logs with Waterfall BlackBox

Upon discovery of a cyberattack, forensic experts look inside the compromised network’s various logs to locate and analyze tracks left by the attacker. Logs are the baseline …

gear
New infosec products of the week​: November 25, 2016

Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed Anomali, provider of threat intelligence platforms, today announced the availability of Anomali STAXX, a free …

world
Unidirectional communications in a bidirectional world

Unidirectional Security Gateways can replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from …

Don't miss

Cybersecurity news