Please turn on your JavaScript for this page to function normally.
Door
Quantum computing is imminent, and enterprises need crypto agility now

Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …

SMART Modular T5PFLC FIPS 140-2 SSDs protects sensitive data against cyberattacks

SMART Modular Technologies announced its T5PFLC FIPS 140-2 SSDs which provide certified authentication, sophisticated encryption, and are available in capacities from 120GB …

Panaseer unveils cyber measurement guidance to help avoid incidents

Panaseer announces guidance on best practice cybersecurity measurements to help avoid incidents. Currently, there is limited industry guidance around the most important …

code
Keeping pace with evolving code signing baseline requirements

Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the …

biometrics
IT service desks lacking user verification policy, putting businesses at risk

48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …

Pangiam acquires Trueface to provide a safer and more personalized travel experience

Pangiam announced that it has acquired Trueface. Terms of the transaction were not disclosed. This is the second acquisition completed by Pangiam since being formed by AE …

Stacklet Platform delivers frictionless governance that accelerates cloud adoption in large-scale environments

Stacklet announced Stacklet Platform, which allows cloud engineering and security teams to easily understand, codify, and automate cloud governance for a frictionless …

1Kosmos Passwordless Identity Package provides a scalable passwordless authentication solution

1Kosmos announced the availability of its Passwordless Identity Package (PIP). The 1Kosmos PIP provides enterprises a risk-free, scalable passwordless authentication solution. …

brain
How do we decide whether or not to trust AI systems?

Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make …

zero trust
Can zero trust kill our need to talk about locations?

As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …

Wind River’s enhancements deliver cybersecurity and anti-tamper protection

Wind River announced security enhancements to Wind River Studio, a cloud-native platform for the development, deployment, operations, and servicing of mission-critical …

TCG’s security guide verifies the trustworthiness of each end point

IT administrators and manufacturers can now secure enterprise computing, with the latest specification from the Trusted Computing Group (TCG). This new guide verifies the …

Don't miss

Cybersecurity news