cybersecurity

BeyondTrust Security Predictions Highlight Cloud Security and Biometrics

BeyondTrust Security Predictions Highlight Cloud Security and Biometrics

The access management specialist BeyondTrust has issued a series of security predictions for the next five years. The company highlighted the threats facing enterprises and consumers, as well as the steps that cybersecurity providers will take to stop them leading up to 2025. Most notably, BeyondTrust suggests that people should pay more attention to the…

Crypto-focused Biometric Encryption Startup Raises $2.2M in Seed Funding

Crypto-focused Biometric Encryption Startup Raises $2.2M in Seed Funding

Biometric cybersecurity startup Keyless has raised $2.2 million in its latest round of seed funding to expand on a product that uses biometrics to unlock users’ private keys. Keyless uses multi-party computation (MPC) at the heart of its service, a process where the users’ security key itself is split into multiple encrypted parts and then…

Zamna Raises $5M in Latest Funding Round for Blockchain-Powered Airport Security Tech

Zamna Raises $5M in Latest Funding Round for Blockchain-Powered Airport Security Tech

Cybersecurity firm Zamna has raised $5 million in its latest round of funding to advance its blockchain-powered airport security technology. Zamna’s platform verifies and connects passenger data between airlines, governments and security agencies, and aims to speed up the airport security process by eliminating the need for manual ID checks by up to 90%. Increasingly…

Jumio Wins Accolades at 2019 Cyber Defense Global Awards

Jumio Wins Accolades at 2019 Cyber Defense Global Awards

Jumio continues to race ahead on the 2019 awards circuit, taking home multiple prizes at the 2019 Cyber Defense Global Awards. The company was selected as the Leader in Authentication and Most Innovative in Biometrics, while Ervinna Lim was recognized in the individual Women in Cybersecurity category. Presented by Cyber Defense Magazine, the Cyber Defense…

Security Vulnerabilities Left iPhone Users Open to Attack: Google Researchers

Security Vulnerabilities Left iPhone Users Open to Attack: Google Researchers

Thousands of iPhone users may have had their devices hacked by malicious code found in a handful of websites, according to security researchers with Google. The security vulnerability has been revealed through a new blog post from Google’s Project Zero team member Ian Beer. The post describes a small group of websites that were likely…

Payments Pros Concerned About Cybersecurity, Want In-House Solutions: Survey

Payments Pros Concerned About Cybersecurity, Want In-House Solutions: Survey

Professionals in the payments industry are very concerned about cybersecurity, but are at least a little mistrustful of third party solutions providers, suggest the results of TD Bank’s 2019 NACHA PAYMENTS survey. Conducted at the 2019 NACHA PAYMENTS Conference in Orlando this past May, the survey polled just under 500 of the payments industry professionals…

IDEMIA Sharpens North America Focus with Latest Corporate Change

IDEMIA Sharpens North America Focus with Latest Corporate Change

IDEMIA has made another important change to its corporate infrastructure, including the appointment of a new high-level executive: Dan Kent is the company’s new Chief Technology Officer, VP, and member of the Executive Committee for IDEMIA’s North American Identity & Security business. Additionally, Kent will be heading a new division that is a consolidation of…

Gemalto Reports Strong Growth from Identity, IoT, and Cybersecurity Activities in Fiscal Update

Gemalto Reports Strong Growth from Identity, IoT, and Cybersecurity Activities in Fiscal Update

Gemalto has issued its year-end results for 2018, showing modest growth despite declining revenues from its removable SIM business activities. The company reports revenues of €2,968,700,000 for the fiscal year, down slightly from 2017’s revenues of €2,971,700,000. But its net result, adjusted for the European Union’s International Financial Reporting Standards, came in at €211 million,…

WISeKey’s Preliminary Results Show Solid Growth for 2018 FY

WISeKey’s Preliminary Results Show Solid Growth for 2018 FY

“The company’s ISTANA security certificate solution is expected to play an important role in that growth, particularly in the Germany and China markets, as will monetization of its recently-launched WISeKey Blockchain Platform.” Switzerland-based IoT security solutions provider WISeKey is reporting solid revenues from its initial, unaudited fiscal results for 2018. The company says its Cybersecurity…

NEC Joins Digital Security Intelligence Sharing Network

NEC Joins Digital Security Intelligence Sharing Network

In an important move for a digital security leader, NEC has joined the Cyber Threat Alliance (CTA). It’s a kind of intelligence network for digital security, and a surprisingly new one at that, founded less than two years ago, in January of 2017. It initially started as a nonprofit organization with six members: Check Point Software…

Experimental Authentication System Uses Speech Recognition and a Smartwatch

Experimental Authentication System Uses Speech Recognition and a Smartwatch

A pair of researchers at the University of Alabama at Birmingham have devised a novel approach to online authentication that leverages speech recognition and a smartwatch. Dubbed ‘Listening-Watch’, the system requires a given user to download a security app on their smartwatch device. When authenticating through a PC or laptop, the computer will play a…

‘Silence’ Malware Attacks Russian Banks

‘Silence’ Malware Attacks Russian Banks

“…NuData Security points out that that use of behavioral and passive biometrics offers just such a solution, since even when hackers attain the credentials of would-be victims…” As if the world needs any more compelling reasons, a new piece of malware is helping to demonstrate why digital security is of critical importance: The ‘Silence Trojan’…

Previous Data Breach Actually Impacted All Users, Yahoo Reveals

Previous Data Breach Actually Impacted All Users, Yahoo Reveals

“There are a couple of silver linings here. One is that it can’t get any worse, since the three billion compromised accounts represent Yahoo’s entire account database.” Yahoo’s 2013 data breach affected three billion accounts, the company has now revealed. It is yet another upsizing of the damage on Yahoo’s part, with the company initially…

Encryption Down, Data Breaches Way Up in Latest Breach Level Index Update

Encryption Down, Data Breaches Way Up in Latest Breach Level Index Update

The first half of this year saw 1.9 billion data records compromised across 918 breaches, according to the latest update to Gemalto’s Breach Level Index. Compared to the last half of 2016, that’s a 164 percent increase. And it points to a disturbing upwards trend, given that 2016 as a whole saw a data breach…

BIO-key Gets Big New Client as Sense of Urgency Rises Over Data Breaches

BIO-key Gets Big New Client as Sense of Urgency Rises Over Data Breaches

“The growing scope of security breaches is making the need for action increasingly clear, and we are seeing this in our customer dialogues, in the pace of inbound inquiries, and importantly in the shortening of the sales cycle in more and more customer dialogues.” -Mike DePasquale, CEO, BIO-key BIO-key has won a new client in the…

2016 Saw 1.4 Billion Records Compromised in Hack Attacks: Gemalto

2016 Saw 1.4 Billion Records Compromised in Hack Attacks: Gemalto

One thousand seven hundred and ninety-two data breaches compromised nearly 1.4 billion records last year, according to Gemalto’s Breach Level Index. The publication is the product of a global database of publicly disclosed breaches. According to its data, last year’s stats reflect an 86 percent increase in data breaches compared to 2015, with some of…

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

The FIDO Alliance is hoping that the Trump administration will heed its advice in a new white paper outlining how FIDO standards could complement existing digital security protocols in use by the government. It’s a response to last December’s report from the US Commission on Enhancing National Cybersecurity, which advocated for stronger authentication methods beyond…

Pages
  • 1
  • 2