Access control and password management solution for privileged endpoints
Bomgar and Thycotic have partnered to provide enterprises with better control and visibility of access to critical endpoints and privileged accounts.Bomgar Privileged Access …
Discovering connections between attackers
In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot. …
Ipswitch offers secure managed file transfer analytics and reporting
At Infosecurity Europe 2015 Ipswitch File Transfer announced the release of Ipswitch Analytics, a new reporting and monitoring solution for MOVEit Secure Managed File …
Microsoft will add SSH support to PowerShell
Third time’s the charm for Microsoft’s PowerShell team, as they will – after two previous attempts unsuccessful due to leadership and culture – finally …
Risk managers most worried about loss of information confidentiality
Almost 70 percent of businesses experienced at least one hacking incident in the last year, according to a study of business risk managers released today by The Hartford Steam …
Cloud-based solutions that protect against zero day attacks
BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time. …
Shadow IT is prevalent in government agencies
Despite clear benefits of cloud services – greater collaboration, agility, and cost savings – federal agencies are slow to migrate to the cloud due to security concerns. As a …
How to turn on two-factor authentication on over 100 popular online services
TeleSign launched Turn It On, a new campaign featuring a guide to two-factor authentication and providing step-by-step instructions for turning on 2FA for over a 100 popular …
Firewalls for SMBs that chew through encrypted streams
At Infosecurity Europe 2015, WatchGuard Technologies announced a new series of enterprise-strength firewalls engineered specifically to protect small- and medium-sized …
Dyre banking Trojan infections more than doubled
“Cybercriminal interest in online banking continues to grow, and crooks wielding the Dyre/Dyreza banking Trojan continue spewing out spam emails delivering a new variant …
Infosecurity Europe 2015, expo floor, part three
Infosecurity Europe 2015 is underway in London, and infosec companies, experts and customers are crowding the expo floor. For up-to-date conference news check out our …
How to raise users’ expectations about security and privacy?
Users do not seem to care much about privacy and security. When buying a new smartphone, for example, they rarely ask about security updates and how long the device will be …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research