
Browsing: Information Security

NIST has published Special Publication (SP) 800-116 Revision 1, Guidelines for the Use of PIV Credentials in Facility Access. It…


By Chris Cubbage, Executive Editor JASK has successfully raised US$25 million in Series B financing, with almost all provided by…


— IBM customers can now simplify data management, protection, backup, recovery, migration and indexing of their data, whether it is…


Promotion Extends Barracuda’s Position in Cloud Security and Data Protection in Asia Pacific Barracuda Networks has announced the appointment of…


Simkins to spearhead company’s continued growth in the government sector and expand portfolio of services in Australia Vault has announced the…



NIST is publishing Special Publication (SP) 800-171A, Assessing Security Requirements for Controlled Unclassified Information (CUI). It is intended to help…


EU Cybersecurity Agency ENISA organised an international cybersecurity exercise Imagine this: It is a normal day at the airport. All…


The European Commission is proposing to create the first ever Digital Europe programme and invest €9.2 billion to align the…


FireEye has released research detailing how the malware TRITON works and was created. TRITON was identified late last year by…


By Alan Zeichick, Tech Editor, NetEvents When it comes to cybersecurity, there are no rules. You can’t write rules that…