Topic: Security - Page 240
Avast Launches Mobile Security App for iPhone Users
Avast Mobile Security for iOS secures photos in an encrypted vault, sends notifications if passwords are leaked, and identifies vulnerable Wi-Fi networks
Trend Micro Research Finds Major Lack of IoT Security Awareness
Only 14% of respondents say they have complete organizational awareness of IoT threats
37% claimed they are not always able to define their security needs before implementing IoT solutions
59% of corporate IoT attacks target office devices
Sixgill Backstops Security with Blockchain Data Integrity for IoE Applications
Sixgill Integrity Ensures Trustworthiness of Sensor Data Traversing Distributed Networks, Automated for Decisions and Actions in Real-time Operations
Netskope Expands Market-Leading IaaS Security Capabilities with Continuous Security Assessment and Monitoring Capabilities
Only CASB with single platform to protect sanctioned and unsanctioned SaaS, IaaS, and PaaS environments
Threat Stack and Red Canary Announce Partnership to Drive Incident Response and Remediation in the Cloud
Threat Stack Extends Cloud SecOps Program with Critical Incident Response Partnership
Digital Defense Announces Frontline Active Threat Sweep
Fast, Easy to Deploy, Cost-Effective Alternative to Threat Hunting Platforms
Nearly 70 Percent of SMBs Experience Cyber Attacks, Half Do Not Know How to Protect Their Companies
Ponemon’s 2018 State of Cybersecurity in Small and Medium Size Businesses study demonstrates weak passwords and negligent employees leave SMBs vulnerable
Sectigo Names Jason Soroko Chief Technology Officer of IoT
Industry Veteran to Lead Sectigo’s Continued Innovation in IoT Device and Network Security
Media Alert: Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions
Sophos†(LSE: SOPH) has launched its†2019 Threat Report providing insights into emerging and evolving†cybersecurity trends.†The report, produced by†SophosLabs†researchers, explores changes in the threat landscape over the past 12 months, uncovering trends and how they are expected to impact cybersecurity in 2019.
Kingston Enhances Award-Winning IronKey D300 Encrypted USB
Unique Serial-Number and Bar Code on Each Drive
Virtual Keyboard Helps Prevent Keylogging

