Cyber Security
Identity extensibility delivered for the cloud enterprise
Delivering on the SailPoint vision to embed identity into the cloud enterprise’s digital fabric, SailPoint Technologies has announced additional extensibility functionality to its platform. To enable customers and partners to find value with the updates, SailPoint also introduced the new SailPoint Developer Community to help them move quickly and with less effort.
Q&A explores platform’s new developer community
In this Q&A with Grady Summers, EVP Solutions and Technology at SailPoint, we explore the platform’s new developer community and extensibility features.
eMCOS and XGuard protect mission-critical assets
eSOL, creator of the eMCOS multikernel (distributed microkernel) RTOS, and Karamba Security, have combined eSOL’s eMCOS and Karamba’s XGuard solutions to offer advanced cyber-protection for connected cars and smart-factory equipment.
OPTIGA authenticate IDoT solution for enhanced protection
Consumer devices, home appliances and industrial machines are constantly exposed to the risk of counterfeit spares and accessories. Fakes can compromise functionality, user safety and – as a result – brand value. To solve this problem, Infineon Technologies has launched the OPTIGA Authenticate IDoT anti-counterfeit turnkey solution which combines enhanced authentication with configuration flexibility.
BlackBerry 2021 Annual Threat Report uncovers breadth of COVID-19 exploitation
BlackBerry has released the 2021 BlackBerry Threat Report, detailing a sharp rise in cyber threats facing organisations since the onset of COVID-19. The research shows a cyber crime industry which not only adapted to new digital habits, but also became increasingly successful in finding and targeting vulnerable organisations. The research also highlights a dangerous new shift in the cyber crime world, one where mercenaries and crimeware-as-a...
GTT DDoS mitigation service to enhance network security
GTT Communications has announced that Performive has selected GTT DDoS Mitigation Service to enhance the security capabilities of its network to protect against DDoS (distributed denial of service) attacks. GTT currently provides IP transit services to Performive, ranging in speed from ten to 100 Gbps, that connect cloud and data centre facilities in 16 cities in North America and Europe.
How to identify and react to a data breach
Preparation is essential when it comes to data protection. Many startup organisations are unsure how to recognise a breach, how to react, and how to respond. Failure to report a violation is usually down to a lack of knowledge, expertise, and data protection training. Training your staff in how to identify and respond to a personal data breach can save you a whopping fine, of up to €20m or 4% of your global turnover, later on.
What can basketball teach us about managing cyber security?
In the documentary The Last Dance, Netflix took us on a trip down memory lane by exploring Michael Jordan’s final season with the Chicago Bulls. With six NBA championships under his belt, Jordan’s unwavering competitiveness at being the best - and control of his team mates - was an essential factor in carrying the team to victory. Written by Grady Summers, EVP Solutions and Technology at SailPoint
New research unveils surge in automated cyber crime
Cyber criminals targeting web applications are not getting their hands as dirty, as a surge in automated cyber attacks targeting web applications is recorded by Barracuda Networks, provider for cloud-enabled security solutions.
80% of people share too much on social media, compromising security
A new report from Tessian, the human layer security company, reveals that 84% of people post information to their social media accounts every week, with two-fifths (42%) posting every day, and are unknowingly giving away information that helps hackers launch successful social engineering or account takeover attacks.