Cyber Security
Welcome to The Age of CISOs Quantifying Risk
Cyber attacks are an inevitable part of everyday business for organisations worldwide. However, despite the increased awareness of the major consequences a successful attack can have, many organisations are still downplaying the risks. By Miles Tappin, VP of EMEA at ThreatConnect
TPM 2.0 software stack with security integration
To facilitate integration in Linux-based systems, Infineon Technologies has announced that it now provides its OPTIGA TPM 2.0 solution with a TSS host software implementing the latest FAPI standard. Infineon has developed the open-source software jointly with Intel Corporation and Fraunhofer Institute for Secure Information Technology SIT.
Research sheds light on cyber crime targeting digital identities
SailPoint Technologies has released the findings from a new survey of security and IT managers/directors that explored why large, well-resourced enterprises are continuing to be compromised. The one common denominator that stands out above the rest as a leading facilitator of cyber incidents - digital identities.
Cyber security hub keeping businesses safer online
With the cost of cyber crime in Europe rising to an average of €50,000 per incident - up from €10,000 the previous year - an attack can be very expensive for small to medium-sized businesses with limited resources.
Middlebox Security Protocols specification released
ETSI has announced a new specification, ETSI TS 103 523-2: Transport Layer MSP (TLMSP), Part 2 of the Middlebox Security Protocol (MSP) series, which defines a protocol for varied (fine-grained) access control to communications traffic. This specification was developed by the ETSI Technical Committee CYBER.
Air IT achieve cyber security certification from CREST
Air IT has joined a select group of security providers certified by CREST, a not-for-profit certification body that represents and supports the technical information security industry whilst offering buyers a list of security providers they can trust.
Identity extensibility delivered for the cloud enterprise
Delivering on the SailPoint vision to embed identity into the cloud enterprise’s digital fabric, SailPoint Technologies has announced additional extensibility functionality to its platform. To enable customers and partners to find value with the updates, SailPoint also introduced the new SailPoint Developer Community to help them move quickly and with less effort.
Q&A explores platform’s new developer community
In this Q&A with Grady Summers, EVP Solutions and Technology at SailPoint, we explore the platform’s new developer community and extensibility features.
eMCOS and XGuard protect mission-critical assets
eSOL, creator of the eMCOS multikernel (distributed microkernel) RTOS, and Karamba Security, have combined eSOL’s eMCOS and Karamba’s XGuard solutions to offer advanced cyber-protection for connected cars and smart-factory equipment.
OPTIGA authenticate IDoT solution for enhanced protection
Consumer devices, home appliances and industrial machines are constantly exposed to the risk of counterfeit spares and accessories. Fakes can compromise functionality, user safety and – as a result – brand value. To solve this problem, Infineon Technologies has launched the OPTIGA Authenticate IDoT anti-counterfeit turnkey solution which combines enhanced authentication with configuration flexibility.