Industry


September 5, 2017

By Linda Musthaler

Israeli startup Axonius today announced $4 million in seed funding from YL Ventures, with participation from Vertex Ventures and Emerge Capital.


March 20, 2016

Brought to you by BeyondTrust 

Weighing in:

Morey Haber, VP of Technology, BeyondTrust
John J. Masserini, CSO, MIAX Options

In this two-part Q&A, Morey Haber and John Masserini discuss the current and future state of biometrics. Industry thought leaders, Haber and Masserini address leading questions surrounding biometrics from the vendor and enterprise perspective.

In part one, Morey and John examined the possibility of biometrics as a replacement for existing authentication technology and discussed methods for using biometrics to augment existing solutions.

In this installment, Haber and Masserini continue their assessment of biometrics and other forms of adaptive authentication. They also examine the process for retaining and purging biometric data, and draw conclusions.

 


March 13, 2016

Brought to you by BeyondTrust 

Weighing in:

Morey Haber, VP of Technology, BeyondTrust
John J. Masserini, CSO, MIAX Options

In this two-part Q&A, Morey Haber and John Masserini discuss the current and future state of biometrics. Industry thought leaders, Haber and Masserini address leading questions surrounding biometrics from the vendor and enterprise perspective.
 

Q: Can biometrics replace any existing authentication technology today?


February 2, 2016

By Bob Tarzey

U.S. companies that operate in the European Union (EU) need to understand what drives European organizations when it comes to data protection. This applies to both commercial organizations that want to trade in Europe and IT suppliers that need to ensure the messaging around their products and services resound with local concerns.


December 4, 2015

By Aimee Rhodes

Social media cybersecurity company ZeroFOX has announced that it has raised $27 million in an angel round led by Silicon Valley venture firm Highland Capital, along with previous investors New Enterprise Associates (NEA), Genacast Ventures and Core Capital. 

Headquartered in Baltimore, ZeroFOX provides detection and defense for social media threats, which Cisco’s 2015 Midyear Report (p 28) cited as the number one method for web-based attacks to breach organizational networks.


November 25, 2015

By Steve Hunt

Let's make a correlation between medicine and security. Many people rely on Western medicine for health and wellness. We purchase pharmaceuticals from the major producers, and go to doctors when we want more medicine. Many of us, though, seek out alternatives to Western drugs.

So why not look beyond traditional Western "medicine" for security solutions.


October 5, 2015

By Zeus Kerravala
Founder and Principal Analyst ZK Research

It’s been said that in life there are only two things that are inevitable – death and taxes.  However, if you’re in the cyber security business, I’d like to add a third item to the list and that is that hackers will always find a way to stay ahead of security technology.  

We build firewalls, now web apps are exploited to come in through the web ports.  Anti-virus evolved so attackers turn to phishing.  The latest security to come under fire has been sandboxing.


July 21, 2015

By Zeus Kerravala
Founder and Principal Analyst ZK Research
Gigamon is a ZK Research Client

Gigamon on Tuesday launched its GigaSECURE architecture; what it calls the security market's first Security Delivery Platform (SDP).  

Gigamon is a market leader in visibility platforms that provide pervasive information of network traffic, users and applications to network management tools.  The visibility platform is a “fabric” that processes and analyzes data and then delivers it to different management tools.  This improves both the accuracy and performance of network management solutions.


April 16, 2015

By Bob Tarzey

Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite dating from the late 1950s, remain in widespread use.

Although organizations are reliant on these applications they are often impossible to change as the original developers are long gone and the documentation is poor. With the advent of Windows and then web browsers, there was a need to re-present the output of old COBOL applications. This led to the birth of screen-scraping, the reading of output intended for dumb terminals and repurposing it for alternative user interfaces.


April 15, 2015

By Bob Tarzey

Many will be familiar with the term bot, short for web-robot. Bots are essential for effective operation of the web: web-crawlers are a type of bot, automatically trawling sites looking for updates and making sure search engines know about new content. 

To this end, website owners need to allow access to bots, but they can (and should) lay down rules. The standard here is to have a file associated with any web server called robots.txt that the owners of good bots should read and adhere too.


Page 1 of 4 : First   1 2 3 4 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter