One of the scariest things about online scams is their impact on enormous segments of the population. The victims often deal with reputational damage and expenses associated with recovering from the attack and improving their current computer security practices to reduce the chances of something happening again. Anyone needing a […]

Cofense Labs Uncovers Large Scam Targeting Millions

Recently the well-known provider of service assurance, cybersecurity, and business intelligence solutions, NETSCOUT Systems Inc, released its semi-annual Threat Intelligence Report highlighting cybercrime as a mainstream business model. The report also examines the maturation of Nation-State sponsored Advanced Persistent Threat (ATP) groups and new findings on IoT vulnerabilities. With a […]

New Report Highlights Cybercrime Innovation

TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level.  This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having “a coach in their […]

TrackTik Software Offers Breakthrough Automation for Security Workforce Management

Deep Learning Proves Key to Detecting Known and Unknown Threats Hiding in Encrypted Web, Network Communications Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden within encrypted SSL traffic. On the heels of this announcement, Brilliance Security […]

When You Live and Die by the 1-Second Rule

By Matthias Völkl, Cherry, Vice President Business Unit Office & Security Did you know that 87 percent of companies rely on employees having access to mobile business apps from their personal smartphones? It wasn’t so long ago that employers issued the same computer equipment to each employee — regardless of work […]

6 Facts You Should Know About the Future of BYOD

New findings from Cequence Security’ CQ Prime research team uncovers the use of Bulletproof Proxy networks by bad actors to automated bot attacks against web applications. “Bulletproof Proxies: The Evolving Cybercriminal Infrastructure” details how bulletproof proxy providers include millions of globally distributed IP addresses that are marketed under the guise of legitimate […]

Bulletproof Proxy Networks Target Retail and Financial Web Applications, Mobile ...

For various reasons, governments around the world are taking steps to direct and manage the use of the internet within their borders. Geopolitical situations and apprehension about data privacy give way to restrictions for commerce and civilian internet use. In most cases, actions to restrict access to the global internet […]

Dark Consequences: Former NSA operative presents an eye-opening report

The report examines the state of crowdsourced security In September of 2017, the consumer credit reporting agency Equifax announced a data breach that affected over 140 million people. The breach cost the company a blow to its reputation and billions of dollars in settlements. It was an exploitation of a […]

Bugcrowd’s Priority One Report 2019 Edition Now Available

Tel Aviv, Israel, July 30, 2019 – Perimeter 81, a pioneer in zero trust software-defined network access, has partnered with SentinelOne, the autonomous endpoint protection company. The partnership will provide a wide range of businesses, from midsize companies to Fortune 500s, with unified network and endpoint security, ensuring more effective threat defense for the […]

Perimeter 81 Partners with SentinelOne to Deliver Fully Automated, Zero ...

Major update offers security teams higher video stream density as well as reduced cost per desktop and video stream resulting in lower TCO and improved situational awareness Austin, Texas, July 24, 2019 — Pivot3, a leading provider of intelligent infrastructure solutions, today announced the Virtual Security Operations Center (Virtual SOC), designed to address the […]

Pivot3 Delivers Secure, Real Time Access and Control to Mission-Critical ...

Just weeks after unveiling the future of cloud security in the form of cloudAshur, iStorage, the award-winning developer and manufacturer of hardware encrypted data storage devices, has announced the launch of the datAshur PRO² – a PIN authenticated, hardware encrypted USB flash drive with next-generation security capabilities. The ultimate in […]

iStorage Launches datAshur PRO²: their most secure PIN authenticated, hardware ...

Cloud computing brought substantial changes to the security industry. Before it came to the forefront, people had to use CD-ROMs to update security software, for example. Concerning physical security, the only option for getting a more updated model of something like a camera or a lock was typical to buy […]

6 Cloud-Based Solutions for Better Physical and Cybersecurity