Honeywell plans to purchase an OT security vendor founded by Israel Defense Forces veterans to deliver asset discovery, threat detection and compliance management to industrial organizations. The SCADAfence acquisition will allow Honeywell to offer an end-to-end enterprise OT cybersecurity platform.
ThreatLocker will debut a security reporting tool for small businesses that not only details what's running in their environment but also where it was developed, CEO Danny Jenkins said. The company can break down where any dark mode extension in a client's environment came from and who's funding it.
A mature cybersecurity program is not necessarily an effective one. And while many companies conflate maturity with efficacy, the CISO knows that when it comes to information security, there is a significant difference between the two.
Most of the time, maturity means there are systematic processes in place that...
Insider threats continue to rise, increasing 44% over two years, according to Ponemon institute. With growing corporate layoffs and challenging financial conditions, there is a clear risk of disgruntled employees taking IP and financial data. Employees with valid credentials or bad actors with compromised credentials...
Startup Lumu edged out larger incumbents Extra Hop, Arista Networks and Trend Micro for the top spot in Forrester's first-ever network analysis and visibility rankings. The percolating of federal zero trust mandates into the civilian world prompted Forrester's evaluation of providers in the market.
After a brief respite, CISOs see the threat landscape heating up once again, and have recalibrated their level of concern to match what they felt at the start of the pandemic.
To find out how cybersecurity leaders are managing, Proofpoint surveyed 1,600 CISOs from around the world. They share their experiences of...
At peak, MFA-bypass accounted for more than a million messages per month and Telephone-oriented attack delivery (TOAD) messages peaked at more than 13 million per month!
The most critical variable in today’s cyber threats is – people. This year, the 2023 Human Factor report takes an in depth look at new...
Cloudflare and Check Point joined Proofpoint and Microsoft atop Forrester's email security rankings, while Trend Micro, Barracuda Networks and Mimecast tumbled from the leaders category. A number of security vendors have gotten into email protection in recent years by acquiring CAPES startups.
A finalist at this year's RSA Innovation Sandbox contest landed Series A funding to detect threats and secure access for nonhuman identities. The $25 million will enable Astrix Security to expand from managing access for nonhuman identities to understanding threats to services and applications.
Researchers at AhnLab Security Emergency Response Center observed APT37 target South Korean individuals with spear-phishing emails to inject wiretapping malware. The state-backed cybercrime group primarily employs spear-phishing to compromise the devices of victims.
The 2023 Data Breach Investigations report says that 83% of breaches involved external actors—with the majority being financially motivated. This snapshot highlights important takeaways for the Public Administration (NAICS 92) sector, which includes establishments of federal, state and local government agencies as...
C5 Capital extended struggling threat detection firm IronNet a financial lifeline contingent on retired four-star Gen. Keith Alexander stepping down as CEO of the company he founded. The venture capital firm will inject $51 million if IronNet hires ex-Houghton Mifflin Harcourt CEO Linda Zecher.
The newest challenge of 2023? Blocking threats before they attack.
60% of breaches occur because a patch was available for a known vulnerability but not applied and it can take less than 15 days for an attacker to exploit a discovered vulnerability.
With the ever-changing technology landscape, there is a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.