Tenable Network Security Unveils New Solution For Measuring Security Assurance At Gartner Security & Risk Management Summit 2016

Tenable gives CISOs the right tools to continuously measure security program effectiveness, identify gaps and take decisive action against cyber threats in mobile, cloud or on-premises environments Tenable Network Security, Inc. a global leader transforming security technology for the business needs of tomorrow, announced today a new solution that helps organizations measure security program effectiveness to gain […]

Reducing The Compliance Burden

The compliance landscape has changed significantly in the last few years. Not only are IT security threats continually evolving, but so are regulations related to compliance and security protections. With the whole technology sector moving at such a fast pace, new challenges are inevitably going to emerge. We live in an age where IT security […]

The Bank Vault Isn’t Secure: So What Hope Do the Rest of Us Have?

The losses being reported for recent bank cyberattacks are frighteningly large– banking cybercrime in 2016 most definitely pays. Things used to be so simple in the Good Old Days… Ever since the earliest forms of banking were established there has always been a need to protect the currency of the day. The first treasuries were […]

Acea Distribuzione Deploys Check Point SCADA Security Solution To Protect Critical Infrastructure Against Cyber Threats

Large Italian utility provider uses 1200R security appliance to enhance visibility and control of SCADA networks Check Point® Software Technologies Ltd. (Nasdaq: CHKP) announced Acea Distribuzione, part of Acea Group, one of the largest Italian public utility companies for power and water supply, has deployed Check Point’s 1200R security gateway appliances to secure its critical […]

51 Million File Sharing Accounts Hacked

Following the news that a hacker put 51 million file sharing accounts for sale on dark web, Beardsley, Security Research Manager at Rapid7 commented below. Tod Beardsley, Security Research Manager at Rapid7: “The iMesh breach from 2013 contains the usual bad passwords made familiar from many similar breaches over the years, such as “123456,” “password,” and “qwerty,” as […]

Intelligent Key Management: How Endpoint Encryption Safeguards Business Productivity

In an effort to stay connected while on-the-go, employees are using cloud services as part of their productivity suite – unfortunately, these services can be implemented without enterprise permission. Although these cloud-based collaborative tools are enabling workers to gain access to files when outside of the office, there is a layer of risk being added […]

The Case For Business-Grade FSS

File sync and share (FSS) services are designed to foster collaboration and communication among employees and increase productivity. File sync and share tools also allow employees to access documents from anywhere on any device. This is increasingly important in today’s mobile world, as many people work from home or on the road regularly. According to […]