Tags: Cybersecurity

Sage opens up Start-up exchange competition for North East

Sage has announced a new competition for start-ups that will see the winners win a visit to Atlanta. Oddly while the press release talks about an exchange programme, there was no announcement visible about a similar competition in Atlanta. Not completely open Interestingly, the competition is not completely open to any start-up. Sage wants the…

John Durant on securing your business

As part of Enterprise Times’ recent road trip across the USA we stopped off in Minneapolis to visit Code42. We sat down and talked with John Durant, Chief Technology Office and SVP. Durant talked about the challenges organisations face when scaling up their patching processes. It is a major headache for many organisations. Recent malware and…

Introducing a blockchain-based security token

Rivetz Intl., a new subsidiary of Rivetz Corp., is introducing a blockchain-based security token. The idea is to combine trusted computing with blockchain technology to offer comprehensive privacy protection. Mobile devices are, today, essential to decentralized data processing. But that processing is easily corrupted. By focusing on the device identity, continuously measuring the state of the…

Talking cybersecurity with Dr Richard Ford

Enterprise Times recently visited Forcepoint’s HQ in Austin, Texas where we got to sit down with Chief Scientist, Dr Richard Ford and talk cybersecurity. It was an interesting conversation that looked at WannaCry and the failure of many companies to stop thinking of a physical perimeter around their network. We talked about a range of…

What’s good about IBM and Cisco’s security hook up

IBM and Cisco have announced that they are to collaborate and better integrate their solutions to improve cybersecurity. In their joint press release announcement, the collaboration will include: “IBM Security’s QRadar, Watson for Cybersecurity, App Exchange, X-Force Threat Intelligence, Resilient IRP and managed security services, and Cisco’s Next-Generation Firewall (NGFW), Next-Generation Intrusion Protection System (NGIPS) and Advanced Malware Protection (AMP)…

Improving the way security intelligence is analysed

Researchers at the University of Portsmouth are working on new ways to analyse security intelligence data. The project is one of eight that are due to be announced by the Centre for Research and Evidence on Security Threats (CREST). The goal is to detect any bias in the work of security analysts. It is also…

Trend Micro takes a look at Fake News

The rise of Fake News to dismiss something that presidents, politicians and companies disagree with has been interesting. The reality is that fake news has been around for a long time. Governments have used it for propaganda, the military has used it to deflect the enemy and companies have used it to drive false advertising…

MacRansom coming to a Mac near you

Security vendor Fortinet has revealed details of the MacRansom, Ransomware as a Service (RaaS) malware. The blog, written by security researchers Rommel Joven and Wayne Chin Yick Low, should act as a warning to Mac users to secure their devices. The researchers believe that this is the first RaaS targeted at Mac OS. The attack…

(ISC)2 highlights European demand for cybersecurity workers

As if there was need for another report, (ISC)2 has weighed in on the shortage of skilled cybersecurity staff. Unlike other reports, the (ISC)2 data has a higher value. The report was compiled from a survey of its own membership with over 19,000 responding. Inside Europe it managed just 3,694 responses but it hasn’t said…

Oracle reminds people about security

Oracle issued a timely press release last week to remind people of their identity SOC framework. Eyes were focused on the Wannacryt ransomware worm that impacted 74 countries. That was according to one of the better articles out there on The Register. So what was Oracle Security shouting about? According to Oracle their identity-based, Security…