By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities

Cybersecurity Startup Competes Against Top Vendors at DreamPort’s Insider Threat Attack Competition NEW YORK—Jazz Networks – a cybersecurity intelligence company – announced today that it placed first in a competition to detect insider threat attacks in real-time during a simulated U.S. Cyber Command battlefield. DreamPort is a cyber innovation and […]

Jazz Networks Wins U.S. Cyber Command Competition

Total Number of Records Exposed Reached 11.5 Million in 2018, More Than Twice That of 2017 CAMPBELL, CA – February 25, 2019 – Bitglass, the Next-Gen CASB company, has released its fifth annual Healthcare Breach Report. Each year, Bitglass analyzes data from the U.S. Department of Health and Human Services’ “Wall of […]

Bitglass 2019 Healthcare Breach Report: Hacking and IT Incidents Account ...

Spherical Defence has been selected to participate by VCs for its advanced application-layer anomaly detection platform powered by unsupervised deep learning, which enhances security teams through  increased visibility into network traffic and reduced false positives San Francisco, California – 02/19/2018 – Spherical Defence has been selected to participate in the […]

Spherical Defence ​to Present to Panel of Leading Venture Capitalists ...

MCLEAN, Va., Feb. 21, 2019 — Endera, provider of the first continuous evaluation platform for workforce risk, today released a new report, Security Executives on the Future of Insider Threat Management, which takes a hard look at the business impacts of workforce-related incidents and the major challenges found in securing the modern day workforce. To […]

New Survey Uncovers the Impacts of Hidden Workforce Risk

Partnership Expands U.K. Business Partner Access to Cobalt Iron’s Innovative Enterprise Data Protection Products and Solutions LAWRENCE, Kansas, and BRACKNELL, Berkshire, U.K. — Feb. 19, 2019 — Cobalt Iron Inc., a leading provider of enterprise data protection SaaS, and Tech Data Corporation, a global technology distributor, today announced a distribution partnership […]

Cobalt Iron and Tech Data Partner to Extend Access to ...

Ponemon Institute just released its Challenging State of Vulnerability Management 2019 report.  What can the results of this 600+ cybersecurity leaders and professionals survey teach us about the state of vulnerability management today? In a press release today, Balbix says: Balbix Inc., provider of the security industry’s first system built for avoiding […]

The Challenging State of Vulnerability Management: What Can We Learn ...

What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?

Thomvest leads round with participation from Sinewave, Bain Capital Ventures and Mayfield; new advisory board includes prominent members of security and development community SANTA CLARA, Calif., Feb 12, 2019 – ShiftLeft™ Inc., an innovator in application-specific cloud security, today announced it has raised $20 million in Series B funding. This […]

ShiftLeft Raises $20 Million Series B Funding to Accelerate Adoption ...

By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions

The convenience of online shopping allows people to buy the things they want through the internet, then get them delivered to their doorsteps days or even hours later. But online shopping’s popularity also caused a rise in “porch pirates,” the thieves who look for packages left outside homes and snatch […]

What the Prevalence of Porch Pirates Says About the Need ...