Day: October 5, 2021

FileCloud integrates with Microsoft Teams to simplify file and link sharing from a single workspace

The developing hybrid work model has placed a spotlight on collaboration software, as companies look for ways to mix and match tools for employees scattered across multiple locations. The latest version of FileCloud’s cloud-agnostic enterprise file sync, sharing and data governance platform seamlessly integrates with Microsoft Teams, so that organizations can easily share files and …

FileCloud integrates with Microsoft Teams to simplify file and link sharing from a single workspace Read More »

Tobii ehances security features for new line of Acer PCs with Tobii Aware

Tobii has signed an agreement with Acer for the integration of its Tobii Aware software into a line of Acer Veriton Z All-In-One (AIO) PCs. Tobii Aware software is developed to enhance user privacy and to make computers smarter and more secure. Through attention computing, the software visually senses the user’s presence and intent. It …

Tobii ehances security features for new line of Acer PCs with Tobii Aware Read More »

EPIC Joins Coalition Urging FCC Not to Permit Unfettered Ringless Voicemails

robocalls TCPA EPIC Joins Coalition Urging FCC Not to Permit Unfettered Ringless Voicemails EPIC has joined a coalition of consumer groups led by the National Consumer Law Center to urge the FCC to reject a proposal that would make it legal for callers to drop voicemails directly into people’s phones without their consent. The groups …

EPIC Joins Coalition Urging FCC Not to Permit Unfettered Ringless Voicemails Read More »

Cisco and Tata Communications expand strategic global partnership to help create new services

Tata Communications and Cisco Systems announced the expansion of their two-decades-long strategic global partnership. This new agreement is between Tata Communications and Cisco Meraki to empower enterprises with simple and easy to deploy, manage, and analyse IT infrastructure for delivering anywhere, anytime access. Cisco Meraki is onboarded within the Tata Communications ecosystem to offer a …

Cisco and Tata Communications expand strategic global partnership to help create new services Read More »

Scanco partners with CoreChain to automate the payment process with blockchain technology

Scanco Software and CoreChain Technologies announce that they are partnering to co-develop an integration of the CoreChain payments network with Scanco’s software products. The co-developed solutions, including an enhanced version of Scanco Purchase Agent, will enable Scanco customers to streamline their B2B payments process and unlock new supply chain financing opportunities. Leveraging enterprise blockchain technology …

Scanco partners with CoreChain to automate the payment process with blockchain technology Read More »

Sepio Systems integrates with Guardicore Centra to defend Tier-1 bank against cyber attacks

Sepio Systems announced that its HAC-1 solution has been integrated with Guardicore Centra’s Microsegmentation security solution to defend a Tier-1 bank against today’s most sophisticated cyber-attacks. “Sepio and Guardicore share a zero-trust philosophy, so our solutions are quite complementary,” said Sharon Besser, SVP of Business Development, Guardicore. “This successful integration unquestionably opens the door for …

Sepio Systems integrates with Guardicore Centra to defend Tier-1 bank against cyber attacks Read More »

CISA Releases Security Advisory for Honeywell Experion and ACE Controllers

CISA has released an Industrial Controls Systems (ICS) advisory detailing multiple vulnerabilities affecting all versions of Honeywell Experion Process Knowledge System C200, C200E, C300, and ACE controllers. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review ICS advisory ICSA-21-278-04 Honeywell Experion …

CISA Releases Security Advisory for Honeywell Experion and ACE Controllers Read More »

Dragos partners with Xylem to bring industrial cybersecurity in the water sector

Xylem and Dragos announced they have partnered to bring industrial cybersecurity to critical infrastructure in the water sector. The agreement will see Xylem and Dragos offering co-branded incident response and incident prevention services to Xylem’s water utility customers worldwide. The partnership brings water utilities the most experienced teams of digital water experts and industrial cybersecurity …

Dragos partners with Xylem to bring industrial cybersecurity in the water sector Read More »

Convergint acquires Keyotel to expand its footprint across Germany

Convergint announced the acquisition of Keyotel. As a result of this acquisition, Convergint will double its footprint across Germany, establish an office in Frankfurt, and further strengthen its service to global customers. Founded in 2009, Keyotel provides a wide range of services from design to installation and service of electronic security across Germany. The company’s …

Convergint acquires Keyotel to expand its footprint across Germany Read More »

Adaptive Shield raises $30M to enable companies to secure their SaaS stacks

Adaptive Shield announced a $30M series A round of financing led by New York-based global private equity and venture capital firm Insight Partners, with additional investors including Okta Ventures and existing investor, Vertex Ventures Israel. Adaptive Shield will use the funding to enable companies to secure their SaaS stacks, many of which are already compromised …

Adaptive Shield raises $30M to enable companies to secure their SaaS stacks Read More »

How to Check if Someone is Using Your Identity

A good time to check if someone is using your identity is before it even happens.  One of identity theft’s several downsides is how people discover they’ve become a victim in the first place—by surprise. They go to rent an apartment, open a line of credit, or apply for financing, only to discover that their finances or reputation has taken a hit because of identity thief.   And those …

How to Check if Someone is Using Your Identity Read More »

Mauro Carobene joins Kaleyra as Chief Business Officer

Kaleyra announced that Mauro Carobene has joined as the Company’s new Chief Business Officer, effective immediately. In this role, Carobene will be focused on the global expansion of the Company’s new and existing business initiatives, including their presence in the banking, financial services, and insurance (BFSI), technology, healthcare, commerce, logistics and travel sectors. Carobene brings …

Mauro Carobene joins Kaleyra as Chief Business Officer Read More »

SynSaber appoints Michael Quigley as Chief Architect

SynSaber announced the appointment of software industry veteran Michael Quigley as Chief Architect. Quigley brings unparalleled and proven experience to SynSaber in the creation of software foundations for rapid, adaptive and innovative products. As Chief Architect, Quigley will be responsible for designing and developing SynSaber’s core software products, and will work to deliver the company’s …

SynSaber appoints Michael Quigley as Chief Architect Read More »

JFrog receives CNA certification to help security researchers verify and triage their vulnerabilities

JFrog announced it has been designated by the CVE Program as a CVE Numbering Authority (CNA). With this certification, JFrog joins an elite group of public and private sector organizations authorized to assign CVE identification numbers to newly discovered security vulnerabilities and publish related details in associated CVE Records for public consumption. This designation allows …

JFrog receives CNA certification to help security researchers verify and triage their vulnerabilities Read More »

BT and Toshiba build commercially available quantum-secured metro network in London

Countering the growing threat to traditional network security from quantum computing, BT and Toshiba announced that the two companies will build and trial commercially available quantum-secured metro network. The brand-new network will connect sites in London’s Docklands, the City and the M4 Corridor, and will provide data services secured using Quantum Key Distribution (QKD) and …

BT and Toshiba build commercially available quantum-secured metro network in London Read More »

Security researchers find another UEFI bootkit used for cyber-espionage

The number of UEFI bootkits used in targeted attacks has been slowly growing in recent years, highlighting that threat actors have found reliable and stealthy methods to abuse the UEFI component to deploy highly persistent malware on targeted systems using a mechanism thought to be more secure than the older BIOS technology. Past examples of …

Security researchers find another UEFI bootkit used for cyber-espionage Read More »

ISO 27001 Doesn’t Require as Much Documentation as You Think

Last Updated on October 5, 2021 If your organization is preparing for an ISO 27001 certification audit, you’re probably documenting everything but the steps for cleaning the coffee maker in your break room. Who cares if nobody ever looks at it again or uses it to maintain your ISO 27001 information security management system (ISMS) …

ISO 27001 Doesn’t Require as Much Documentation as You Think Read More »