IBM Makes Case for Lattice Cryptography for Encryption

IBM Makes Case for Lattice Cryptography for Encryption

IBM at the IBM Think 2018 conference today made a case for a new approach to cryptography that will be made necessary by the imminent cracking of encryption based on elliptical algorithms by quantum computers. Michael Osborne, manager of the security research group at IBM Research, said that while this ... Read More
Security Boulevard
insider risk, productivity, hybrid work data privacy cyber zero-trust RDP RATs Menlo Security remote work home branch Zix

Rise of SD-WAN Alters Nature of Branch Office Security

The rise of cloud computing has fundamentally changed the way network traffic flows within most organizations. Users in branch offices now typically access applications over public internet connections versus backhauling all network traffic through a secure data center. A new survey of 309 IT professionals at organizations with more than ... Read More
Security Boulevard
social media Media cybersecurity

IBM Survey Finds More Believe They’re Prepared for Cyberattack

A global survey of 2,848 IT and cybersecurity professionals conducted by Ponemon Institute of behalf of IBM suggests many of them may be living in a world their hopes and dreams exceed hard reality when it comes to their response to a cyberattack. The survey finds that nearly three-quarters (72 ... Read More
Security Boulevard
CyberArk Acquires Vaultive for Cloud Access Security Tech

CyberArk Acquires Vaultive for Cloud Access Security Tech

| | acquisition
Now that multiple clouds are becoming a standard element of the enterprise there’s a more pressing need to manage who gets access when. That realization has lead to a wave of mergers and acquisitions in which once-standalone cloud access security broker (CASB) software is now being embedded within larger cybersecurity ... Read More
Security Boulevard
AI

Splunk to Dive Deeper into Cybersecurity with Phantom Buy

For a long time now Splunk has been content to essentially offer up cybersecurity advice made possible by applying analytics to machine data captured within the logs of various systems. That information then would be used to identify anomalies indicative of a cybersecurity breach. But with its move to acquire Phantom ... Read More
Security Boulevard
architecture

DevSecOps: Cisco Extends Scope of Security Analytics Platform

Cisco Systems is extending the reach and scope the security capabilities of the Tetration analytics platform to include identification of software vulnerabilities and exposures, baselining process behavior and identifying any deviations. The goal is to provide finer-grained controls over workloads for organizations embracing DevSecOps, said Yogesh Kaushik, senior director for ... Read More
Security Boulevard
developers

PhishMe Rebrands to Apply AI to Combat Social Engineering Attacks

PhishMe, a provider of training tools employed by organizations to help end users better recognize spear phishing attacks such as social engineering, announced today it will now be known as Cofense, after being acquired by a private equity firm. Cofense CEO Rohyt Belani, who held the same position as the ... Read More
Security Boulevard
Cisco Report Cyber Attacks

Cisco Report Confirms Cyber Attacks More Sophisticated

An annual report on the state of cybersecurity released Feb. 21 by Cisco Systems suggests cybercriminals are becoming more sophisticated and devious in their attacks to compromise IT environments. Based on a survey of 3,600 chief security officers (CSOs) and security operations (SecOps) managers from 26 countries, the report finds ... Read More
Security Boulevard
machine authentication

Oracle Bets on Machine Learning Algorithms to Secure IT Future

At its recent OpenWorld 2017 conference, Oracle kicked off a multi-pronged effort that promises to employ machine learning algorithms and other artificial intelligence (AI) technologies to address data security once and for all. The first of those efforts is centered around a forthcoming managed instance of an autonomous Oracle 18c ... Read More
data cybersecurity software CISA ransomware cybersecurity protect data c-suite

SAP CISO: Application Security Still Too Difficult

Many advances in application security have been made over the years, yet building and deploying secure applications remains a challenge for even the most well-heeled of organizations. Justin Somaini, chief information security officer (CISO) for SAP, says the sheer volume of code coupled with the increased rate at which additional ... Read More