Category: Cyber Resilience

Making an industrial difference

Making an industrial difference

Unidirectional gateway security blocking cyberattacks against control networks – Editor’s Insight interview with Lior Frenkel CEO, Waterfall Security CONTROL NETWORK ENVIRONMENTS Framing the network environment will help focus your attention when explaining this technology. Waterfall Security is an industrial cyber security company. Industrial being the key term. Waterfall’s unique technology is used to protect the […]

Crisis Communication: Reputation Management When A Crisis Hits

Crisis Communication: Reputation Management When A Crisis Hits

All too often, leaders within companies, organisations and governments involved in a crisis have had to learn the hard way that major disruptions, or events once seemed unthinkable, can become a reality. Whether it be death caused by an accident within the workplace, share prices declining due to a failed takeover, a major environmental catastrophe […]

A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability

A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability

With hackers taking advantage of the Apache Struts vulnerability and aggressively attacking enterprises worldwide, Qualys can protect your organization from this critical bug, which is hard to detect and difficult to patch. Recently disclosed, the Struts vulnerability is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by […]

IBM and Red Hat Collaborate to Accelerate Hybrid Cloud Adoption with OpenStack

IBM and Red Hat Collaborate to Accelerate Hybrid Cloud Adoption with OpenStack

Clients can quickly and easily extend on-premises workloads to Red Hat OpenStack Platform and Red Hat Ceph Storage on IBM Private Cloud IBM and Red Hat have announced a strategic collaboration designed to help enterprises benefit from the OpenStack platform’s speed and economics while more easily extending their existing Red Hat virtualized and cloud workloads […]

Cyber Insurance: Considerations for Businesses

Cyber Insurance: Considerations for Businesses

Exploring Risk Control Packages, First- and Third-Party Coverages Can Help Mitigate Cyber Events Organizations considering stand-alone cyber coverage should carefully evaluate their risk profile and determine whether more traditional policies provide adequate coverage according to some of the tips offered in a newly released RIMS Professional Report titled, Cyber Insurance: Considerations for Businesses. Authored by […]

Protect 2017 to Focus on the New Normal:  Cyber Security and Terrorism

Protect 2017 to Focus on the New Normal: Cyber Security and Terrorism

Protect 2017, a conference-exhibition that empowers government and the private sector to detect and prevent future cyberattacks and terrorism, will be held on March 29 and 30, 2017 at the SMX Convention Center in Pasay. At Protect 2017, experienced national and corporate security executives discuss the present state of security both in the real world, […]

Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys

Gemalto’s HSM enables Microsoft Azure Information Protection customers to maintain full control of encryption keys

Organisations can now take advantage of “Hold Your Own Key” capabilities with on-premises SafeNet Luna HSMs to secure confidential data in Microsoft Azure and Microsoft Office 365 Gemalto has announced that Microsoft Azure Information Protection customers can now take advantage of the new “Hold Your Own Key” (HYOK) functionality using Gemalto’s SafeNet Luna Hardware Security Modules […]

Sonus and Palo Alto Networks Team to Deliver Advanced Mobile Network Protections from Cyber Threats Targeting Rich Communication Services

Sonus and Palo Alto Networks Team to Deliver Advanced Mobile Network Protections from Cyber Threats Targeting Rich Communication Services

Sonus helps Mobile Network Operators (MNOs) prevent advanced cyber-attacks targeting their Evolved Packet Core (EPC) networks and IP Multimedia Subsystems (IMS) through security architecture developed with Palo Alto Networks. Sonus addresses evolving MNO security challenges in 4G-LTE networks with a security architecture developed with Palo Alto Networks that provides full visibility and enforcement associated with […]

Ixia releases first annual Security Report

Ixia releases first annual Security Report

Beyond malware increases, attack surface expansion is compounded by cloud, IoT, and increasing network segmentation Ixia has announced the release of the first Ixia Security Report, a summation of 2016’s biggest security events including findings from Ixia’s Application and Threat Intelligence (ATI) Research Center.  The ATI Research Center leverages the knowledge of hundreds of Ixia engineers, […]

New Head of Saab Market Area Asia Pacific

New Head of Saab Market Area Asia Pacific

Defence and security company Saab has appointed Dean Rosenfield as new head of Market Area Asia Pacific from 1 January 2018. Dean Rosenfield is the Managing Director of Saab Australia. In his present role, Dean has been working to grow and diversify the local business. Since taking over in March 2013 the Australian business has […]