NIST invites comments on Draft Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key Management: Part 1 – General. This…
As cybercriminals continue to become more sophisticated and prolific, one of the key weapons in their arsenal is automation, letting…
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0…
Industry’s first-ever fixed cost licensing model means businesses don’t have to sacrifice security because of cost unpredictability LogRhythm has released…
An Implementation Guide for the Cybersecurity Framework (CSF) Manufacturing Profile Low Impact Level has been developed for manufacturers managing cybersecurity…
BlackBerry Limited has announced the creation of BlackBerry Advanced Technology Development Labs (BlackBerry Labs), a new business unit operating at…
Genetec & NEXTDC Partner on Data Centre Security By Chris Cubbage, Executive Editor As the world transitions to 5G networks…
Most security leaders change organisations every few years. The reality is that people leave jobs for many reasons. Here’s why…
By Anthony Langsworth Information security teams (InfoSec) suffer the curse and blessing of working with others. All InfoSec teams need to…
Emergence can provide up to $10 million capacity on a primary basis through its online portal, but many companies seek…