<
>

Posts in Taxonomies

FireEye Introduces Community-Based Protection for Before, During and After a Cyber Attack

FireEye, Inc., the intelligence-led security company, today announced the availability of a set of solutions to empower collaboration and bolster access to community-based protection from cyber...
Taxonomy: Cyber Safety

Ivanti Offers Six Security Tips for Cybersecurity Awareness Month

Ivanti, the company that unifies IT to better manage and secure the digital workplace, today announced top cybersecurity tips and best practices to help raise awareness in support of Cybersecurity...

Ruby Rose is the McAfee Most Dangerous Celebrity™ 2018

Actress Ruby Rose replaced singer-songwriter, Avril Lavigne as the most dangerous celebrity to search for online. Actor Paul Rudd of Ant-Man fame came out top as Singapore’s most dangerous...
Taxonomy: Cyber Safety

CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution

This alert is originally published and can be viewed at www.cisecurity.org OVERVIEW: A vulnerability has been discovered in Microsoft Windows JET Database Engine that could allow for remote...

Synopsys Releases BSIMM9 Study Highlighting Impact of Cloud Transformation and Growth of Software Security Community

Synopsys, Inc. today released BSIMM9, the latest version of the Building Security In Maturity Model (BSIMM) designed to help organizations plan, execute, and measure their software security...
Taxonomy: Cloud Security

Norton by Symantec Urges Consumers to Help Protect Their Personal Data

In the wake of Facebook’s recent security vulnerability, and the prevalence of data breaches in today’s online world, Norton by Symantec is encouraging consumers to take an active role in...
Taxonomy: Cyber Safety

Red Hat Drives Security Orchestration and Automation with New Ansible Capabilities

Red Hat, Inc., the world's leading provider of open source solutions, today previewed new Ansible Automation integrations to help customers automate and orchestrate enterprise security solutions,...

How Machine Learning Works in Cyber Security

Almost every vendor in the tech space is claiming that their offering is powered by artificial intelligence or machine learning. These are buzzwords that marketing departments feel the need to...
Taxonomy: Cyber Safety

Cyber Security Forum : Data Governance and Transformation Success

Why You Should Attend:   As an IT leader, technology governance, keeping security apace with transformation agendas and increasing regulations are all critical factors for making your...
Taxonomy: Cyber Safety

NEC Networks & System Integration Corporation Selects Juniper Networks to Simplify Security Operations and Threat Response in the IoT Era

Juniper Networks, an industry leader in automated, scalable and secure networks, today announced that NEC Networks & System Integration Corporation (NESIC) has integrated Juniper's advanced...
Taxonomy: Devices & IoT

Pages