Home / All Security News
Mobile Payments Today, 02/20/19
CipherTrace raises $15M to expand blockchain security business
CipherTrace, a Menlo Park, California based blockchain security firm, has raised $15 million in funding led by Palo Alto-based venture capital firm...
Coinbase buys blockchain intelligence startup to boost security and new asset discovery
Coinbase, the world’s most valuable crypto company, is gearing up to add more cryptocurrencies to its exchange thanks to its latest acquisition. We...
When surveillance meets incompetence Evil, and poorly done at that
Last week brought an extraordinary demonstration of the dangers of operating a surveillance state — especially a shabby one, as China's apparently ...
PR Newswire, 02/14/19
Dojo By BullGuard Delivers First 5G And Edge Computing-Enabled IoT Security Platform For Fixed and Mobile Broadband Networks
SAN FRANCISCO and HERZLIYA, Israel, Feb. 14, 2019 /PRNewswire/ -- Dojo by BullGuard, the market leading IoT security platform for Communication Ser...
Huawei ready to tackle extra security to stay in 5G kit race
Chinese tech giant Huawei is ready to face any extra security measures required ...
Elevate Security announces $8M Series A to alter employee security behavior
It’s well understood that many network breaches begin with phishing emails designed to trick users into giving hackers their credentials. They don’...
Banking Tech, 02/12/19
Symantec acquires Luminate Security for cyber cloud defence
Getting prepared for infrastructure managed by Azure, AWS and Google.
AP News, 02/11/19
C2A Security Completes $6.5M Series A Round to Bring its Best-in-Class in-Vehicle Cybersecurity Solutions to More Automotive Customers
JERUSALEM--(BUSINESS WIRE)--Feb 11, 2019--C2A Security , an Israeli startup providing in-vehicle solutions preventing life-threatening cyberattacks...
AP News, 02/11/19
Cequence Security Named Gold Winner in Info Security Product Guide’s 2019 Global Excellence Awards®
SUNNYVALE, Calif.--(BUSINESS WIRE)--Feb 11, 2019--Cequence Security announced today that Info Security Products Guide, an industry-leading informat...
Argus Press, 02/11/19
CI Security Launches Insight Partner Program to Improve Cybersecurity for More Organizations
SEATTLE--(BUSINESS WIRE)--Feb 11, 2019--More businesses and organizations deserve modern, realistic cyber security. To reach that wider range of cu...
Banish those winter blues with email security
Growing email-based threats require the attention of MSPs
Google is making budget handsets more secure with a new form of encryption
Our picks of the latest models from the top brands to help you find the best laptop for your needs
Security Boulevard, 02/07/19
The Evolving Approach to IoT Security
Despite its myriad benefits, IoT security is proving difficult, due in part to the complexity of securing the network end to end.
vArmour, a security startup focused on multi-cloud deployments, raises $44M
As more organizations move to cloud-based IT architectures, a startup that’s helping them secure that data in an efficient way has raised some capi...
As threats proliferate, so do new tools for protecting medical devices and hospitals
Six months after an episode of “Homeland” showed hackers exploiting security vulnerabilities in the (fictional) vice president’s pacemaker, Mike Ki...
Huawei offers to build cyber security center in Poland
China's Huawei has offered to build a cyber security center in Poland where...
PR Newswire, 02/05/19
Future $59.23 Bn Home Security Solutions Market - Global Outlook & Forecasts 2017-2026
DUBLIN, Feb. 5, 2019 /PRNewswire/ -- The "Home Security Solutions - Global Market Outlook (2017-2026)" report has been added to ResearchAndMarkets....
Security Boulevard, 02/05/19
Ensuring Strong Cyber Security at the Edge
We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continu...
New tool makes it easier to secure IoT devices
Internet of Things devices are appearing in more and more companies, but with them comes the threat of cyberattacks.
5G security concerns persist with new research pointing to critical flaw
The flaw found affects 3G, 4G and 5G protocols and we won't see a fix until the end of the year
Driving Security And Innovation Together To Power Today's Data Company
As reliance on data increases, companies that win the innovation battle will likely be the ones that leverage high-quality, secure data to deliver ...
How IoT applications are driving demand for security analytics
Apps for the Internet of Things technologies will create huge amounts of data.
Raising Trust In Security And Privacy In A Distracted World
Whether you are living in an Atlantean utopia or sunken dystopia, it is critically important to carve out time to rationalize and prioritize what y...
New security flaw impacts 5G, 4G, and 3G telephony protocols
Researchers have reported their findings and fixes should be deployed by the end of 2019.
Computer Business Review , 01/30/19
How to Cover Security Holes Left by Edge Computing
Edge computing is booming, but can lead to unpatched devices causing security issues. Quest Software's Jennifer LuPiba joined Global Data's Kathryn...
Tech Republic, 01/30/19
Why you should use a Managed Security Service Provider instead of in-house security
MSSPs provide flexibility, expertise, and efficiencies in scale. Learn about more advantages below.
Venture Beat, 01/29/19
Pepper IoT: Smart devices aren’t so bright when it comes to security
Smart devices aren't very intelligent when it comes to protecting user privacy and handling security, according to a report by Pepper IoT and Dark ...
Enterprise digital transformation leaves data security behind
Implementing modern systems could have a sinister side-effect for enterprise companies.
Press of Atlantic City, 01/24/19
nCipher Security Delivers Trust, Integrity and Control to Business Critical Information and Applications
CAMBRIDGE, England--(BUSINESS WIRE)--Jan 24, 2019--nCipher Security, the provider of trust, integrity and control for business critical information...
A new startup from Square’s encryption experts
I’m not allowed to tell you exactly how Anchorage keeps rich institutions from being robbed of their cryptocurrency, but the off-the-record demo wa...
New York Times, 01/22/19
Did Australia Poke a Hole in Your Phone’s Security?
A law passed last month allows the authorities to compel tech companies to build tools to bypass their products’ encryption. It has global implicat...
Asian Scientist, 01/21/19
Double Modulation Enhances Hologram Security
A holographic color print developed by scientists in Singapore could help ensure the authenticity of identity cards and money.
VDOO's New Agent For IoT Devices Provides Tailored Endpoint Security
Dell-backed Internet of Things startup VDOO launches an endpoint security agent for connected devices that automatically tailors a security policy ...
The New York Times, 01/21/19
If 5G Is So Important, Why Isn’t It Secure?
The network must be secure enough for the innovations it promises.
Why Compliance Does Not Equal Security
Complying with cybersecurity regulations doesn’t make you secure. For true peace of mind, we need to go further.
Iot For All, 01/17/19
Edge Computing at CES 2019: Developing for Speed & Security
At CES 2019, edge computing was all the rage. IoT For All sat down with MultiTech and Avnet, two leading IoT hardware companies, to discuss their p...
Jewish Press, 01/17/19
Israel, Japan Sign Digital Health Tech, Cybersecurity Deals
The two nations signed a total of six agreements .
EE News Europe , 01/16/19
GrammaTech receives $8.4M from DARPA for cyber security technology
GrammaTech received the 4-year contract from the Defense Advanced Research Projects Agency (DARPA) to develop a solution to generate and deploy sec...
How To Combine Physiological Biometrics And Blockchain For Heightened Security
Blockchain's security is imperfect as it stands. Here's how the CEO of a physiological biometrics solution recommends leveraging physiology to crea...
Tech Target, 01/16/19
Enterprises betting on SOAR tools to fill security gaps
During a recent webinar, security experts highlighted key considerations that should be in place before implementing security automation and SOAR t...
Survey reveals growing concern about container technology security
Ninety-four percent of IT security pros worry about container security, and 60 percent have had container security incidents in the past year. What...
Phys.org , 01/14/19
AI-controlled checks to boost security and speed up traffic at EU borders
Traffic across the EU's external borders is on the rise, as is the threat posed by illegal immigration. As over 700 million people enter the EU eac...
Electric cars: Security flaws could let attackers control charging stations
Details emerge on three vulnerabilities found in Schneider Electric's EVlink Parking charging stations.
Don't Let Blockchain Technology's Security Loopholes Go Unnoticed
Do you assume, for instance, that private 'permissioned' blockchains are secure? You're wrong.