Cyber Security
Help to manage cyber risk holistically
The cyber exposure company, Tenable, has announced that the company more than doubled its Cyber Exposure Ecosystem throughout 2018, including 43 new or enhanced technology integrations and 20 new integration partners. The ecosystem now supports a total of 50 integrations and 39 technology partners.
Vulnerability management for pinpoint cyber security
The Cyber Exposure company, Tenable, has announced the general availability of Predictive Prioritization, an offering which hopes to change how organisations tackle vulnerabilities. Predictive Prioritization enables organisations to reduce business risk by focusing on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.
Business incubator to boost security innovation in IoT
IAR Systems Group has announced that the Group is dedicating an investment fund and efforts to help grow innovative startup companies within IoT and security solutions. Through the Ymir business incubator, the Group will support companies who have new innovative ideas and high-growth potential.
Slashing theft and fraud across an operator’s device portfolio
Mobile cyber security specialist, Trustonic, has announced its new Asset Lifecycle Protection Service (ALPS) for mobile network operators. Mobile operators can now eliminate smartphone theft, fraud and trafficking, allowing them to safeguard their device investments, protect revenue and drive additional profit contribution.
Three levels of security to protect passwords
A new approach to password security has launched, with three levels of security to keep passwords private. Mycena Password Fortress is a patent-pending free to download mobile app which acts as a fortress with three levels of security within the user’s device. The app doesn’t use a master password and heralds in reinforced security with a combination of identification protocols.
A better security system means a secure building
Last year, ONS figures reported the number of burglary offences hit over 420,000, which is a major concern for businesses, facilities managers and homeowners alike. That’s almost 50 burglaries every hour! Having an efficient alarm system that’s reliable is essential to protect against break-ins. Today, complete alarm system kits are not only affordable but also suitable for any building, no matter the size or location. There are sever...
End-to-end LoRa security solution provides secure key provisioning
As the LoRa (Long Range) technology ecosystem accelerates, security remains an area for improvement in the market due to vulnerabilities that leave the network and application server keys accessible in the memory of modules and microcontrollers (MCUs) paired with a LoRaWAN stack. If keys are accessed in a LoRaWAN device, a hacker can impersonate it and authorise fraudulent transactions, which can result in a scalable attack with substantial ...
Filling the identity-shaped holes in business security
IT leaders are under tremendous pressure today - and it is only getting worse. Not only are they charged with enabling users to be productive, but they must also act as the virtual gatekeepers of enterprise security. These teams address rising threats and compliance challenges amid the digital transformation, which nearly every organisation is undergoing. It can be overwhelming. By Juliette Rizkallah, Chief Marketing Officer, SailPoint
Single-chip security solutions offer simple implementation
Designers of Internet of Things (IoT) devices can now access the highly integrated MAX36010 and MAX36011 single-chip security supervisors from Maxim Integrated Products. These security solutions make it easier for designers to implement robust tamper detection, cryptography and secure storage while safeguarding sensitive information via logical and physical protections, without having to be security experts themselves.
$8.4m awarded for autonomous cyber hardening technology
Developer of commercial embedded software assurance tools and cyber security solutions, GrammaTech, announced that it has been awarded an $8.4m four year contract from Defense Advanced Research Projects Agency (DARPA), to develop technology that generates and deploys secure configurations to commercial off-the-shelf (COTS) equipment rapidly and largely autonomously.