Day: November 17, 2021

Karlsgate and LexisNexis Risk Solutions deliver secure patient data for healthcare

Karlsgate announced that it is partnering with the Health Care business of LexisNexis Risk Solutions to introduce a secure identity resolution platform for the healthcare market. Securing patient identities remains an industry focus spurred by HIPAA, yet it often prohibits the ability of organizations to conduct other clinical and operational functions that would benefit all …

Karlsgate and LexisNexis Risk Solutions deliver secure patient data for healthcare Read More »

Nexthink collaborates with Citrix to improve the employee remote work experience

Nexthink and Citrix are joining forces to provide organizations with one view for end-to-end visibility of employee’s digital experiences for customers leveraging Citrix secure remote work solutions. Virtual app and desktop solutions play a crucial role in enabling organizations to continue their adoption of the hybrid work environment. Citrix provides a Desktop-as-a-service (DaaS) and Virtual …

Nexthink collaborates with Citrix to improve the employee remote work experience Read More »

Infosys partners with MIT Technology Review to help enterprises maximize value from the cloud

Infosys and MIT Technology Review launched ‘The Cloud Hub’, a forum offering insights and learning from successful cloud transformations to help global enterprises accelerate their cloud journey. This collaboration will bring together success stories, expertise and experience from a number of leading global brands to demonstrate how value and competitive advantage can be created by …

Infosys partners with MIT Technology Review to help enterprises maximize value from the cloud Read More »

Critical vulnerabilities in NPM would allow hackers to publish new versions of any package

GitHub researchers announced the detection of two severe security flaws in NPM, the Node.js package manager. According to the report, one of these flaws could be exploited by threat actors to publish malicious versions of any package. Mike Hanley, from GitHub, reported that one of these bugs would also have allowed any user to access …

Critical vulnerabilities in NPM would allow hackers to publish new versions of any package Read More »

Norway orders Sectra Tiger solution to protect their most sensitive communication

The Norwegian Defence Materiel Agency has ordered additional units of the approved mobile encryption system Sectra Tiger/S from international cybersecurity and medical imaging IT company Sectra. The solution enables officials in the Norwegian defense and civil authorities to communicate securely and efficiently, preventing the risk of eavesdropping or information leakage. The new order encompasses the …

Norway orders Sectra Tiger solution to protect their most sensitive communication Read More »

KeyCaliber raises $2.6M to accelerate platform development and propel go-to-market channels

KeyCaliber announced its $2.6M seed funding from leading venture capital firms Lytical Ventures, Unusual Ventures, and HearstLab as well as accomplished cybersecurity industry experts and entrepreneurs including Brian NeSmith (co-founder of Arctic Wolf), Sumit Agarwal (co-founder of Shape Security), and Dov Yoran (co-founder of ThreatGrid). This initial funding will be used to bring on key …

KeyCaliber raises $2.6M to accelerate platform development and propel go-to-market channels Read More »

Justt raises $70M to help global merchants fight false chargebacks with smart technology

Justt announced that it has raised $70 million in funding as it expands its mission to help global merchants fight false chargebacks with smart technology. The funding was raised across three tranches, including a Series B round led by Oak HC/FT and two previously unannounced rounds led by Zeev Ventures and F2 Venture Capital, respectively. …

Justt raises $70M to help global merchants fight false chargebacks with smart technology Read More »

How You Can Bridge the Cloud Skills Gap

Has uncertainty brought on by the pandemic changed the way your company works? This unplanned shift has revealed the gaps that many companies have in cloud technology and has therefore accelerated cloud adoption. Due to continuing uncertainty, more organizations are now charting new courses for their journey toward cloud computing and digital transformation. In fact, …

How You Can Bridge the Cloud Skills Gap Read More »

When You sysWhisper Loud Enough for AV to Hear You

When I started my journey in Malware Development and AV/EDR Evasion, most of the articles and blog posts I have read recommended the use of syscalls. By using syscalls, an adversary can bypass detection controls (such as user-land Hooking) by jumping into the kernel-mode. Evasion is possible in this case since AV/EDR systems can only …

When You sysWhisper Loud Enough for AV to Hear You Read More »

Every day is Black Friday at Tutanota.

The Black Friday hype is just another method by marketers and advertisers to keep you buying. Higher, faster, further – that's the aim of marketers. But for consumers it leads to over-consumption and unnecessary spending. That's why we are saying no to Black Friday. Instead we are offering fair prices all year round.Read more

Sedric raises $3.5M to support its global expansion and transform fintech compliance

Sedric announced that it has raised US$ 3.5 million in seed funding to increase consumer protection and transform fintech compliance. Led by StageOne Ventures, Sedric will use the funding to support its global expansion and onboard its growing base of new fintech customers. Sedric enables fintech companies to increase consumer protections and comply with changing …

Sedric raises $3.5M to support its global expansion and transform fintech compliance Read More »

What Are The Best Ways To Detect Malicious Activity?

If an organization has a web application, it’s a certainty that it would face security incidents and accidents from time to time. As the technology is getting advanced, malicious activities on the web also tend to be increasing day by day. Attackers are adopting new ways to hack organization data. Keeping up with cyber security …

What Are The Best Ways To Detect Malicious Activity? Read More »

authID.ai appoints Neepa Patel to its Board of Directors

authID.ai announced that it has named Neepa Patel to its Board of Directors. She will become the Company’s fifth independent director, joining seven other executives from senior managerial roles spanning IT consulting, operations, risk, accounting, and nancial services. Drawing on fifteen years of experience in next generation blockchain systems and regulatory compliance, Patel deepens the …

authID.ai appoints Neepa Patel to its Board of Directors Read More »

Hackers against Belarusian government: migration databases leaked

Amid the political tension related to the heinous acts of Belarus authoritarian government, a report surfaced from an alleged hacking group claiming that they had accessed a database with information on all those individuals crossing the country’s borders, including President Alexander Lukashenko and alleged secret agents. Since Lukashenko’s controversial victory, a hacking group calling itself …

Hackers against Belarusian government: migration databases leaked Read More »

CyberSaint appoints Jerry Layden as CEO

CyberSaint announced Jerry Layden as Chief Executive Officer (CEO), assuming responsibilities effective September 2021. Layden, who previously served as CyberSaint’s Chief Revenue Officer (CRO), established a highly successful approach towards strategic partnerships and customer acquisition that resulted in triple-digit year over year growth amidst the COVID-19 pandemic. Now as CEO, Layden’s leadership will propel further …

CyberSaint appoints Jerry Layden as CEO Read More »

Hands-on walkthrough of the AWS Network Firewall flexible rules engine – Part 2

This blog post is Part 2 of Hands-on walkthrough of the AWS Network Firewall flexible rules engine – Part 1. To recap, AWS Network Firewall is a managed service that offers a flexible rules engine that gives you the ability to write firewall rules for granular policy enforcement. In Part 1, we shared how to …

Hands-on walkthrough of the AWS Network Firewall flexible rules engine – Part 2 Read More »

Consumer protection in focus at FCC and FTC nomination hearings

The Senate began hearings Wednesday on nominees to help lead federal agencies key to the future of privacy and cybersecurity in the United States.  Much of the Senate Commerce Committee’s questions for Alvaro Bedoya, President Joe Biden’s nominee for a vacant spot on the Federal Trade Commission (FCC), and acting Federal Communications Commission (FCC) chair …

Consumer protection in focus at FCC and FTC nomination hearings Read More »

NSA Grants Boost University's Cyber Academy

NSA Grants Boost University's Cyber Academy The University of North Georgia (UNG) has grown its cybersecurity training program after receiving funding from the National Security Agency (NSA).  UNG, which has campuses in Blue Ridge, Cumming, Dahlonega, Gainesville, and Oconee, was awarded two grants totaling $265,000 by the NSA. The university will use the money to provide free …

NSA Grants Boost University's Cyber Academy Read More »

NSA Grants Boost University’s Cyber Academy

NSA Grants Boost University’s Cyber Academy The University of North Georgia (UNG) has been able to grow its cybersecurity training program after receiving funding from the National Security Agency (NSA).  UNG, which has campuses in Blue Ridge, Cumming, Dahlonega, Gainesville, and Oconee, was awarded two grants totaling $265,000 by the NSA. The university will use the money …

NSA Grants Boost University’s Cyber Academy Read More »