Attend this webinar on 5/15 at 2pm ET to learn how to create a flexible, agile IT infrastructure that responds to changing business needs and adds significant value to your organization while reducing costs.
Virtual pen testing can enable automated data feeds and model execution from real-time assessment inputs; simulate loss scenarios associated with attack successes; and it can be used for offline cyber resiliency testing.
The rise of attacks against email concern many organizations, and vendors are on the case. There were several announcements of products attempting to stem the tide of email attacks this year at RSA, including new products from FireEye and Agari.
Unisys debuted a tool that associates a user's network rights with their verifiable biometrics, and Feitian wants user fingerprints for for authentication, physical access, identification, payment, and access to applications or data.
The changes would involve making it possible to send messages between the different properties Facebook owns, including WhatsApp and Instagram, which would make it easier for Facebook to merge the data on users’ identities.
Cyberattacks are a reality for organizations of all sizes and in all industries. Rather than focusing on firewalls and other aspects of the IT infrastructure, companies must shift their IT security focus to people. People-centric security...
LogRhythm, a company focused on security intelligence, has introduced a new product that reduces the humans required to discover and respond to advanced network-borne threats. LogRhythm NDR automates the three pillars of its solution: threat...