Eskenzi PR ad banner Eskenzi PR ad banner

Security News

NYOTRON LOGO

Nyotron, an Israeli company and provider of the industry’s first OS-Centric Positive Security solution to strengthen endpoint protection, today announced that the company has entered into a strategic partnership agreement with Ingram Micro to help it accelerate its global presence – particularly in the United States – and build its global channel ecosystem. The partnership, which includes a $10 million investment from Ingram Micro, expands on an existing relationship between Nyotron and Ingram Micro, which...

Read more
Imperva Logo

Imperva, Inc. (NASDAQ: IMPV), a leading global provider of best-in-class cybersecurity solutions on-premises, in the cloud and across hybrid environments, today announced it entered into a definitive agreement to be acquired by leading private equity technology investment firm Thoma Bravo, LLC. Upon the close of the transaction, Imperva will operate as a privately-held company with the flexibility to focus on execution and drive to be a world-class profitable growth company. Under the terms of the...

Read more
Fidelis Logo

Fidelis Cybersecurity announces support for Microsoft Azure’s high-speed virtual network terminal access point (TAP) to enable continuous mirroring of virtual machine (VM) network traffic, without the use of agents, directly to Fidelis Network sensors. Applications and workloads are continuing to migrate to the cloud but security visibility for cloud-based applications has lagged behind. With cyber attackers constantly exploiting weaknesses and access credentials, cloud network traffic analysis is critical for threat detection, threat hunting, and data...

Read more
Touch Biometrix

Touch Biometrix, a disruptive fingerprint technology company headquartered in North Wales, has appointed a Chief Innovation Officer. Rob Van Lier has joined the St Asaph-based company, which was recently recognised as one of the Top 20 global key players in the fingerprint sensing market alongside the likes of Apple. Rob is the latest senior appointment to Touch Biometrix, following the recruitment earlier this year of Eric Derckx as Chief Technology Officer. Touch Biometrix was established...

Read more
kaspersky lab logo

Kaspersky Lab Automatic Exploit Prevention technology, embedded in most of the company’s endpoint solutions, has detected a series of targeted cyber-attacks. The attacks were attempted by a new piece of malware that exploited a previously unknown zero-day vulnerability in the Microsoft Windows operating system. The intension was for cybercriminals to gain persistent access to victim systems in the Middle East. The vulnerability was patched by Microsoft on 9 October. An attak via a zero-day vulnerability...

Read more
Comptia Logo

CompTIA, the world’s leading technology association, has today announced the launch of a fully funded cyber security training programme for Scottish businesses. Funded by the Digital Scotland Business Excellence Partnership, and aligned to Skills Development Scotland’s Digital Skills investment plan, ‘Cyber Ready Scotland: A professional Upskilling Pilot Programme’ will upskill IT workers to give them and their companies the cybersecurity skills necessary to protect them online. Cybersecurity is a tier 1 national threat. However, the...

Read more
Cybersecurity Robustness

Over a quarter (27%) of enterprise IT departments must wait at least a month before they can install vital security updates. That’s according to a new ‘State of Software Delivery’ report from enterprise content delivery company Kollective, which examines the software testing and distribution bottlenecks throughout large organisations in the US and UK. Kollective’s report, which incorporates research from 260 IT managers, leaders and decision makers, highlights how the network security of UK businesses is...

Read more
partnership

With Operational Technology (OT) attacks on the rise, Nozomi Networks and IBM earlier this week announced that they have teamed up to bring industrial organizations around the world easier access to deep OT network visibility and continuous threat detection. The news follows recent warning from various bodies – including the UK’s NCSC and the US’ DHS and FBI of an increased treat to critical infrastructures  which could potentially cause damage far beyond the obvious economic...

Read more

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? When it comes to defending from cyberattacks, enterprises need all the...

Read more

If you are at the water cooler muttering “But that’s EXACTLY the graph they asked for.” Enter SIN#1… “Get me a plot of x versus y, colour-coded by z!” They sounded so sure when they asked you, so you created what they wanted, showed it to them, and they hated it. Ok, a bit melodramatic. But in my experience, building the metrics people ask for rarely delivers the insight they want. Why? Often, when someone...

Read more
Page 25 of 26 1 24 25 26