Is Your Identity and Access Management Fit for Purpose?

In the old days, identity and access management (IAM) was a mainly internal affair; employees accessing applications, all safely behind a firewall. OK, perhaps the odd remote user, but they tunnelled in using a VPN and, to all intents and purposes, they were brought inside the firewall. Those days are long gone. Today the applications…

Details

Data-Exfiltration Prevention Startup enSilo Raises $10M in Series A Round

enSilo, which provides a data-exfiltration prevention platform, on Tuesday announced that it had raised $10M in Series A funding with Lightspeed Venture  Partners leading the round and existing investor Carmel Ventures taking part . The Israeli-based company said it would use the funding to expand its presence in the United States including relocating its headquarters…

Details

US Government Cyber-Breach Act of Chinese, Reports

Two cyber breaches of US government systems that potentially compromised personally identifiable information of at least four million present and former federal employees is suspected to be the work of Chinese military hackers, US officials investigating the breach were reported as saying on Thursday. The breach was discovered in April by the Office of Personnel…

Details

3 Steps You Can Take to Prep Your Security Program for Docker

As many security professionals may already know, Docker has the potential to have a significant impact on an enterprise.  Among numerous potential advantages, it can increase data center allocation density, the speed of development, it can enable new deployment models for cloud, and increase the efficiency of technical operations. From a security point of view, it…

Details

VENOM Vulnerability Could Take Bite Out of Your Week

The greatest fear of anyone running a virtual machine especially in a shared hosting environment is that an attack against one VM could jump the wall and impact the other VMs on the same machine; a so called guest escape. CrowdStrike, a vendor of host-based security solutions, announced today that one of its Senior Security…

Details

Security Current’s Chief Information Security Officers (CISOs) Name SentinelOne Winner of Its Inaugural Security High Stakes Competition

Security Current today named SentinelOne the winner of its inaugural Security High Stakes competition.  The event was held at the RSA Conference in San Francisco and brought technology providers face-to-face with security experts. Six cutting edge security vendors were given 15 minutes each to get the attention of a panel of 20 CISOs from leading organizations. The…

Details

Tech Vendors Look to Singapore as Hub for Asian Headquarters

Singapore is quickly becoming the country of choice for technology vendors seeking to establish a hub in Asia. Ranked first in Asia, and seventh worldwide, in the Global Innovation Index (GII) 2014, Singapore was noted for its business and regulatory environment, and for its knowledge absorption. The GII is published by Cornell University, INSEAD and…

Details