Author Archive for APSM

Making an industrial difference

Making an industrial difference

Unidirectional gateway security blocking cyberattacks against control networks – Editor’s Insight interview with Lior Frenkel CEO, Waterfall Security CONTROL NETWORK ENVIRONMENTS Framing the network environment will help focus your attention when explaining this technology. Waterfall Security is an industrial cyber security company. Industrial being the key term. Waterfall’s unique technology is used to protect the […]

Surviving through sharing: 'The kilted rogue runner' story

Surviving through sharing: ‘The kilted rogue runner’ story

Raising Awareness of Anxiety, Depression, PTSD and Suicide Prevention. I am 45 years old, and I live with my family here in Perth Western Australia and this is my journey: I am a Royal Navy veteran and an ex UK and WA Police Officer, I survive Depression, Anxiety, PTSD and associated issues. I’m grateful that […]

Crisis Communication: Reputation Management When A Crisis Hits

Crisis Communication: Reputation Management When A Crisis Hits

All too often, leaders within companies, organisations and governments involved in a crisis have had to learn the hard way that major disruptions, or events once seemed unthinkable, can become a reality. Whether it be death caused by an accident within the workplace, share prices declining due to a failed takeover, a major environmental catastrophe […]

A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability

A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability

With hackers taking advantage of the Apache Struts vulnerability and aggressively attacking enterprises worldwide, Qualys can protect your organization from this critical bug, which is hard to detect and difficult to patch. Recently disclosed, the Struts vulnerability is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by […]

IBM and Red Hat Collaborate to Accelerate Hybrid Cloud Adoption with OpenStack

IBM and Red Hat Collaborate to Accelerate Hybrid Cloud Adoption with OpenStack

Clients can quickly and easily extend on-premises workloads to Red Hat OpenStack Platform and Red Hat Ceph Storage on IBM Private Cloud IBM and Red Hat have announced a strategic collaboration designed to help enterprises benefit from the OpenStack platform’s speed and economics while more easily extending their existing Red Hat virtualized and cloud workloads […]

Cyber Insurance: Considerations for Businesses

Cyber Insurance: Considerations for Businesses

Exploring Risk Control Packages, First- and Third-Party Coverages Can Help Mitigate Cyber Events Organizations considering stand-alone cyber coverage should carefully evaluate their risk profile and determine whether more traditional policies provide adequate coverage according to some of the tips offered in a newly released RIMS Professional Report titled, Cyber Insurance: Considerations for Businesses. Authored by […]

Protecting Those Who Protect Others: Introducing SlashPRO Slash Resistant Clothing

Protecting Those Who Protect Others: Introducing SlashPRO Slash Resistant Clothing

SlashPRO Slash Resistant Clothing is designed to protect frontline professionals working in hostile environments, including prison and correctional facility officers, homeland security professionals, police officers and those in the private security sector. Slashing dangers are relatively frequent for these workers and an occupational risk faced on a daily basis. Rapid blood loss often leads to […]

Protect 2017 to Focus on the New Normal:  Cyber Security and Terrorism

Protect 2017 to Focus on the New Normal: Cyber Security and Terrorism

Protect 2017, a conference-exhibition that empowers government and the private sector to detect and prevent future cyberattacks and terrorism, will be held on March 29 and 30, 2017 at the SMX Convention Center in Pasay. At Protect 2017, experienced national and corporate security executives discuss the present state of security both in the real world, […]

Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys

Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys

Organisations can now take advantage of “Hold Your Own Key” capabilities with on-premises SafeNet Luna HSMs to secure confidential data in Microsoft Azure and Microsoft Office 365 Gemalto has announced that Microsoft Azure Information Protection customers can now take advantage of the new “Hold Your Own Key” (HYOK) functionality using Gemalto’s SafeNet Luna Hardware Security Modules […]

Sonus and Palo Alto Networks Team to Deliver Advanced Mobile Network Protections from Cyber Threats Targeting Rich Communication Services

Sonus and Palo Alto Networks Team to Deliver Advanced Mobile Network Protections from Cyber Threats Targeting Rich Communication Services

Sonus helps Mobile Network Operators (MNOs) prevent advanced cyber-attacks targeting their Evolved Packet Core (EPC) networks and IP Multimedia Subsystems (IMS) through security architecture developed with Palo Alto Networks. Sonus addresses evolving MNO security challenges in 4G-LTE networks with a security architecture developed with Palo Alto Networks that provides full visibility and enforcement associated with […]