Industry News

AlienVault Expands USM Anywhere to Include Endpoint Detection and Response Capabilities
Only Security Solution to Automate Threat Detection and Response Across Endpoints and Networks in Cloud and On-Premises Environments from a
Read more.
Spirent Demonstrates Integrated Security and Performance Testing at Black Hat USA 2018 and DEFCON 26
Demonstrates CyberFlood and Security Labs for Comprehensive Testing, Previews New Data Breach Detection Assessment and Presents Findings and Research in
Read more.
Bomgar Releases Free Privileged Account Discovery Tool
Bomgar, provider of secure access solutions, has released its new Bomgar Discovery Tool. This free product generates a comprehensive report revealing
Read more.
Guarding Gas and the Grid: Inside ForeScout’s selection for a crucial energy sector security project – ForeScout
Guarding Gas and the Grid: Inside ForeScout’s selection for a crucial energy sector security project – ForeScout Protecting energy infrastructures
Read more.
Online viewing for the 2018 World Cup heavily benefited the VPN industry: Study
Online viewing for the 2018 World Cup heavily benefited the VPN industry: Study Online viewing for the 2018 World Cup
Read more.
Microsoft was the number one brand spoofed by cybercriminals in Q2 2018
Just in from Vade Secure: Not all hackers are Nigerian Princes. Some pretend to be PayPal. Others are imitating Facebook. But,
Read more.
Nehemiah Security’s EQ Validates Offensive Intelligence to Drive Defensive Advances
Nehemiah Security, supplier of cybersecurity software and services to enterprise and government organizations, today announced major upgrades to the EQ
Read more.
How easy is GPS spoofing?
Check out this video from Regulus that demonstrates how easy it is to spoof a GPS. (Soundtrack costs extra, I
Read more.
Amazon Prime Day Safe Shopping Tips
Today is Amazon Prime Day. It’s a day for deals, and the risk of being defrauded. We asked two cybersecurity
Read more.
StackRox Announces New Release of Its Container Security Platform
Continuous Feedback Loop Between Different Phases of the Container Life Cycle and Orchestrator-based Threat Protection Deliver Unmatched Level of Security StackRox,
Read more.