Security News

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures.  One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs. 

Full Story >

With Ansible Automation, Red Hat Insights Can Resolve Critical Infrastructure Outages Security Risks

Red Hat Insights cloud-based service is integrating with Ansible ‘playbooks’ to deliver abilities to automatically remediate outages or other issues that can impact infrastructure security, performance, and stability.

Full Story >

HPE Update Lets Enterprises, Service Providers More Easily Secure Credit Card Transactions End-to-End

HPE is updating its secure payments technologies to help ecommerce service providers and merchants more easily deliver end-to-end security for credit card transactions and sensitive personal data.  IDN speaks with HPE’s Trish Reilly about the on-going issue of keeping transaction data safe.

Full Story >

RedLock Cloud 360 Aims To Provide Visibility into Security, Risk Across Multiple Public Cloud Environments

More companies are adopting public clouds as part of their digital transformation strategy. RedLock Cloud 360 aims to provide IT with better visibility and control of cloud infrastructure they don’t own.

Full Story >

Distil Networks Lets IT Calculate Economic Risk from ‘Bad Bot’ Attacks; Teams with Verizon on Bad Bot Protection

Distil Networks has published an innovative  Bad Bot Risk Calculator, designed to help organizations understand and quantify the economic risk posed by bad bots.  The tool comes as OWASP, Verizon and other major security voices warn bad bot attacks are a growing risk.

Full Story >

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016.  The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

Full Story >

Splunk Continues To Expand Its Adaptive Response Initiative To Detect, Battle CyberThreats Faster

As cyber threats become more sophisticated, headline-grabbing security point solutions just can’t handle the speed and complexity of diagnosing and fighting off the attacks.  In response, Splunk continues to recruit vendor partners and domain experts to its Adaptive Response Initiative. IDN looks at the latest additions.

Full Story >

2017 Survey: Security Professionals Say Their Enterprises Score ‘Below Average’ in Ability To Assess Cyber Risks

A survey from Tenable Network Security finds infosec professionals rank their enterprise’s ability to assess cyber risks as C-Minus, or below average.  IDN looks at 2017 Global Cybersecurity Assurance Report Card, and why rapid adoption of containers, cloud, mobile and IoT are causing some of the lack of confidence.  

Full Story >

IBM Says Know Your Security Posture: The Key To Incident Response is Understanding Your Risks

Earlier this fall, the Internet was brought to its knees by an army of Internet of Things devices. Given this successful attack on core Internet highways, can any stand-alone company expect to protect itself? How can businesses identify, combat and even predict threats? IDN speaks with IBM Security’s Peter Allor to get suggestions, insights -- and hope.

Full Story >

ForgeRock Says IoT is Pushing Security To Become ‘Password-Less’ and More Friction-Free

ForgeRock says it’s finally time to push ‘password-less’ security.  The company is adding push authentication to its identity platform to enable password-less login and frictionless second factor authentication – for devices and human users.

Full Story >

Exabeam’s CEO Brings Speedy Analytics, Teamwork To Fight Against Ransomware

Exabeam is taking a two-fisted approach to the fight against ransomware. It is bringing together speedy analytics with a strong collation of willing security vendors.  IDN talks with Exabeam CEO Nir Polak.

Full Story >

Identity Gets Boost as ‘DNA’ for Digital Enterprise Security: Top Takeways from Ping’s Cloud Identity Summit

Could identity become the DNA for delivering agile, strong, and situational security solutions for the new-gen digital enterprise?   A growing number of security execs see the possibilities. IDN looks at the Cloud Identity Summit with execs from Ping Identity.

Full Story >

<< Start < Previous 1 2 3 4 5 6 7 8 9 10 Next > End >>

Showing 1 - 12 of 127