Cyber Security
Middlebox Security Protocols specification released
ETSI has announced a new specification, ETSI TS 103 523-2: Transport Layer MSP (TLMSP), Part 2 of the Middlebox Security Protocol (MSP) series, which defines a protocol for varied (fine-grained) access control to communications traffic. This specification was developed by the ETSI Technical Committee CYBER.
Air IT achieve cyber security certification from CREST
Air IT has joined a select group of security providers certified by CREST, a not-for-profit certification body that represents and supports the technical information security industry whilst offering buyers a list of security providers they can trust.
Identity extensibility delivered for the cloud enterprise
Delivering on the SailPoint vision to embed identity into the cloud enterprise’s digital fabric, SailPoint Technologies has announced additional extensibility functionality to its platform. To enable customers and partners to find value with the updates, SailPoint also introduced the new SailPoint Developer Community to help them move quickly and with less effort.
Q&A explores platform’s new developer community
In this Q&A with Grady Summers, EVP Solutions and Technology at SailPoint, we explore the platform’s new developer community and extensibility features.
eMCOS and XGuard protect mission-critical assets
eSOL, creator of the eMCOS multikernel (distributed microkernel) RTOS, and Karamba Security, have combined eSOL’s eMCOS and Karamba’s XGuard solutions to offer advanced cyber-protection for connected cars and smart-factory equipment.
OPTIGA authenticate IDoT solution for enhanced protection
Consumer devices, home appliances and industrial machines are constantly exposed to the risk of counterfeit spares and accessories. Fakes can compromise functionality, user safety and – as a result – brand value. To solve this problem, Infineon Technologies has launched the OPTIGA Authenticate IDoT anti-counterfeit turnkey solution which combines enhanced authentication with configuration flexibility.
BlackBerry 2021 Annual Threat Report uncovers breadth of COVID-19 exploitation
BlackBerry has released the 2021 BlackBerry Threat Report, detailing a sharp rise in cyber threats facing organisations since the onset of COVID-19. The research shows a cyber crime industry which not only adapted to new digital habits, but also became increasingly successful in finding and targeting vulnerable organisations. The research also highlights a dangerous new shift in the cyber crime world, one where mercenaries and crimeware-as-a...
GTT DDoS mitigation service to enhance network security
GTT Communications has announced that Performive has selected GTT DDoS Mitigation Service to enhance the security capabilities of its network to protect against DDoS (distributed denial of service) attacks. GTT currently provides IP transit services to Performive, ranging in speed from ten to 100 Gbps, that connect cloud and data centre facilities in 16 cities in North America and Europe.
How to identify and react to a data breach
Preparation is essential when it comes to data protection. Many startup organisations are unsure how to recognise a breach, how to react, and how to respond. Failure to report a violation is usually down to a lack of knowledge, expertise, and data protection training. Training your staff in how to identify and respond to a personal data breach can save you a whopping fine, of up to €20m or 4% of your global turnover, later on.
What can basketball teach us about managing cyber security?
In the documentary The Last Dance, Netflix took us on a trip down memory lane by exploring Michael Jordan’s final season with the Chicago Bulls. With six NBA championships under his belt, Jordan’s unwavering competitiveness at being the best - and control of his team mates - was an essential factor in carrying the team to victory. Written by Grady Summers, EVP Solutions and Technology at SailPoint