Google Cloud’s zero trust offerings help U.S. government organizations guard against cyberthreats
Google Cloud today announced new zero trust offerings for government, a set of services to help U.S. federal, state, and local government organizations implement zero trust …
Haystack Solutions CATA identifies cognitive abilities of individuals entering or upskilling in cybersecurity
Haystack Solutions introduced the Cyber Aptitude and Talent Assessment (CATA). It is the first such commercially available solution that is scientifically designed to identify …
Red Hat renews FIPS 140-2 security validation for Red Hat Enterprise Linux 8.2
Red Hat announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. The second FIPS …
Securiti partners with Snowflake to enable protection of sensitive data in the Data Cloud
Securiti has partnered with Snowflake to bring it’s advanced functionality also operating natively inside Snowflake Data Cloud. Securiti for Snowflake enables joint customers …
ADVA FSP 3000 ConnectGuard protects data against cyberattacks from quantum computers
ADVA launched an optical transport solution secured by post-quantum cryptography (PQC). The FSP 3000 ConnectGuard optical encryption solution now protects data against …
Thales’s voice biometric solution helps mobile operator call centres fight identity fraud
Thales announces a new voice biometric solution which is part of Thales Trusted Digital Identity Service Platform for onboarding and authentication. It meets the growing …
ISARA Advance Crypto Agility Suite addresses critical cryptographic blind spots
ISARA launched ISARA Advance Crypto Agility Suite, an enterprise solution that allows organizations to discover their cryptographic blind spots and equip them to take action …
Apricorn 20TB Aegis Fortress L3 SSD enables secure storage of large amounts of data
Apricorn released 20TB Aegis Fortress L3 SSD. The 20TB Aegis Fortress L3 brings the innovation, speed, security and high performance, with an unprecedented level of storage …
The paradox of post-quantum crypto preparedness
Preparing for post-quantum cryptography (PQC) is a paradox: on the one hand, we don’t know for sure when, or perhaps even if, a large quantum computer will become available …
Entrust partners with Yubico to issue PIV credentials on YubiKeys for U.S. government employees
Entrust announced a partnership with Yubico allowing U.S. federal agencies to issue YubiKey 5 Series and YubiKey 5 FIPS Series with Entrust derived PIV (Personal Identity …
Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …
Veeam Government Solutions: Backup and protection of government mission-critical data
Veeam Software announced the launch of its new, federal government-focused subsidiary, Veeam Government Solutions. Veeam provides a single platform for modernizing backup, …