• Featured more »

  • Making an industrial difference

    Making an industrial difference

    Unidirectional gateway security blocking cyberattacks against control networks – Editor’s Insight interview with Lior Frenkel CEO, Waterfall Security CONTROL NETWORK ENVIRONMENTS Framing the network environment will help focus your attention when explaining this technology. Waterfall Security is an industrial cyber security company. Industrial being the key term. Waterfall’s unique technology is used to protect the […]

  • Surviving through sharing: 'The kilted rogue runner' story

    Surviving through sharing: ‘The kilted rogue runner’ story

    Raising Awareness of Anxiety, Depression, PTSD and Suicide Prevention. I am 45 years old, and I live with my family here in Perth Western Australia and this is my journey: I am a Royal Navy veteran and an ex UK and WA Police Officer, I survive Depression, Anxiety, PTSD and associated issues. I’m grateful that […]

  • Asia Pacific Security more »

  • Surviving through sharing: 'The kilted rogue runner' story

    Surviving through sharing: ‘The kilted rogue runner’ story

    Raising Awareness of Anxiety, Depression, PTSD and Suicide Prevention. I am 45 years old, and I live with my family here in Perth Western Australia and this is my journey: I am a Royal Navy veteran and an ex UK and WA Police Officer, I survive Depression, Anxiety, PTSD and associated issues. I’m grateful that […]

  • Protect 2017 to Focus on the New Normal:  Cyber Security and Terrorism

    Protect 2017 to Focus on the New Normal: Cyber Security and Terrorism

    Protect 2017, a conference-exhibition that empowers government and the private sector to detect and prevent future cyberattacks and terrorism, will be held on March 29 and 30, 2017 at the SMX Convention Center in Pasay. At Protect 2017, experienced national and corporate security executives discuss the present state of security both in the real world, […]

  • Tech Time more »

  • Making an industrial difference

    Making an industrial difference

    Unidirectional gateway security blocking cyberattacks against control networks – Editor’s Insight interview with Lior Frenkel CEO, Waterfall Security CONTROL NETWORK ENVIRONMENTS Framing the network environment will help focus your attention when explaining this technology. Waterfall Security is an industrial cyber security company. Industrial being the key term. Waterfall’s unique technology is used to protect the […]

  • IBM and Red Hat Collaborate to Accelerate Hybrid Cloud Adoption with OpenStack

    IBM and Red Hat Collaborate to Accelerate Hybrid Cloud Adoption with OpenStack

    Clients can quickly and easily extend on-premises workloads to Red Hat OpenStack Platform and Red Hat Ceph Storage on IBM Private Cloud IBM and Red Hat have announced a strategic collaboration designed to help enterprises benefit from the OpenStack platform’s speed and economics while more easily extending their existing Red Hat virtualized and cloud workloads […]

  • Frontline Security more »

  • A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability

    A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability

    With hackers taking advantage of the Apache Struts vulnerability and aggressively attacking enterprises worldwide, Qualys can protect your organization from this critical bug, which is hard to detect and difficult to patch. Recently disclosed, the Struts vulnerability is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by […]

  • Protecting Those Who Protect Others: Introducing SlashPRO Slash Resistant Clothing

    Protecting Those Who Protect Others: Introducing SlashPRO Slash Resistant Clothing

    SlashPRO Slash Resistant Clothing is designed to protect frontline professionals working in hostile environments, including prison and correctional facility officers, homeland security professionals, police officers and those in the private security sector. Slashing dangers are relatively frequent for these workers and an occupational risk faced on a daily basis. Rapid blood loss often leads to […]

  • Other Recent Articles

  • Cyber Insurance: Considerations for Businesses

    Cyber Insurance: Considerations for Businesses

    Exploring Risk Control Packages, First- and Third-Party Coverages Can Help Mitigate Cyber Events Organizations considering stand-alone cyber coverage should carefully evaluate their risk profile and determine whether more traditional policies provide adequate coverage according to some of the tips offered in a newly released RIMS Professional Report titled, Cyber Insurance: Considerations for Businesses. Authored by […]

  • Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys

    Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys

    Organisations can now take advantage of “Hold Your Own Key” capabilities with on-premises SafeNet Luna HSMs to secure confidential data in Microsoft Azure and Microsoft Office 365 Gemalto has announced that Microsoft Azure Information Protection customers can now take advantage of the new “Hold Your Own Key” (HYOK) functionality using Gemalto’s SafeNet Luna Hardware Security Modules […]

  • Sonus and Palo Alto Networks Team to Deliver Advanced Mobile Network Protections from Cyber Threats Targeting Rich Communication Services

    Sonus and Palo Alto Networks Team to Deliver Advanced Mobile Network Protections from Cyber Threats Targeting Rich Communication Services

    Sonus helps Mobile Network Operators (MNOs) prevent advanced cyber-attacks targeting their Evolved Packet Core (EPC) networks and IP Multimedia Subsystems (IMS) through security architecture developed with Palo Alto Networks. Sonus addresses evolving MNO security challenges in 4G-LTE networks with a security architecture developed with Palo Alto Networks that provides full visibility and enforcement associated with […]