home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

BlueTalon | Unified Data Access Control

SHARESHARESHARE
BlueTalon is a leading provider of Unified Data Access Control for big data and new data initiatives. The BlueTalon Policy Engine delivers precise, consistent, and dynamic user access controls to data across Hadoop, Spark, Cassandra, and traditional RDBMS. The BlueTalon Audit Engine provides a complete audit trail at the level of detail required for regulatory compliance and effective data security.
SHARESHARESHARE

RELATED NEWS


Researchers discovered a wave of BGP hijacking attacks aimed at DNS servers related to payment processing systems in an apparent effort to steal money from unsuspecting users. Researchers discovered BGP hijacking attacks targeting payment processing systems and using new tricks to maximize the attackers hold on DNS servers. Doug Madory, director of internet analysis at Oracle Dyn, previously saw border gateway protocol (BGP) hijacking attacks in April 2018 and has seen them continue through July...
TECHTARGET
READ MORE

When a security breach occurs, an investigation needs to be initiated. Network security forensics is the technology used not only to understand the nature of the breach, but also to trigger the beginning of remediation. Traditional network security platforms include event correlation and full packet capture. However, different security approaches include the collection of flow data and the use of packet headers to reduce storage requirements. This comprehensive report about network security fore...
PR NEWSWIRE
READ MORE

The hacker, whose identity is not known, stole 20,000 email addresses, plus telephone numbers and addresses. The details are said to belong to people who registered for ECB events and although some of the data the company held was encrypted, email addresses, phone numbers and physical addresses were not.
...

ITPRO
READ MORE

UK-based security company Sophos’ synchronized IT security solution, Security Heartbeat, provide next-generation protection for small and medium enterprise. Alongside, the new Sophos XG series offer next-generation firewall and unified threat management (UTM). The first of its kind, Security Heartbeat combines both network and endpoint security, thus, making it easier and faster to detect network security issues, isolate infected devices and come up with immediate and targeted response and resol...
INTERAKSYON
READ MORE

The National Institute of Standards and Technology (NIST) has issued its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats....
SCIENCE DAILY
READ MORE

Check Point has released its Cyber Attack Trends: 2019 Mid-Year Report, revealing that no environment is immune to cyber-attacks. Threat actors continue to develop new toolsets and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party supplier applications and even popular email platforms: Mobile banking: With a 50% increase in attacks compared to 2018, banking malware has evolved to become a very common mobile threat. Today...
SECURITYBRIEF
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...