NXM Labs, Inc., a leader in advanced cybersecurity software for connected devices, today unveiled its NXM Autonomous Security(TM) platform that prevents hackers from gaining unauthorized access to commercial, industrial, medical, or consumer internet of things (IoT) devices. Tested in collaboration with the Jet Propulsion Laboratory (JPL), California Institute of Technology (Caltech), NXM successfully demonstrated the…

This Halloween, you’re likely to see a lot of green tracksuits, thanks to the pop culture juggernaut that is Netflix’s Squid Game. In case you’re still, somehow, in the dark, the South Korean television series is like a mix of Hunger Games and The Running Man, as it follows a desperate group of people lured…

The funding came from ClearSky Security, DNX Ventures, and South Dakota Equity Partners, and Query.AI says it will be used to accelerate adoption of its product. Query.AI has developed what it describes as a security investigations control plane designed to help security teams investigate and respond to incidents by giving them real-time access and centralized insights…

Famed security expert HD Moore’s latest project — an IT and OT asset-discovery platform that attempts to address the-age-old challenge of finding and fingerprinting devices that reside on an organization’s network and their status — just landed $5 million in venture capital funding from some major players in network and security technologies. The VC round…

The chipmaker on Wednesday published its 2020 Product Security Report, which reveals that nearly half of the vulnerabilities patched last year were discovered by its own employees, and the company claims that a vast majority of the addressed issues are the direct result of its investment in product security assurance. According to Intel, 105 vulnerabilities…

Jolted by a sweeping hack that may have revealed government and corporate secrets to Russia, U.S. officials are scrambling to reinforce the nation’s cyber defenses and recognizing that an agency created two years ago to protect America’s networks and infrastructure lacks the money, tools and authority to counter such sophisticated threats. The breach, which hijacked…

Starting off on the right foot in digital defense today means having good Cloud Security Posture Management (CSPM). Although it can be challenging to adopt, this set of strategies and tools manages and orchestrates cloud security in ways other tactics don’t. It shows gaps might arise between organizations’ stated cloud defense policies, their actual posture…

The 5G ecosystem is reaching a level of technology maturity much more rapidly than earlier generations, enabling operators to develop network deployment and go to market strategies with mass-market appeal and scalable across evolving B2C, B2B and B2B2X business models. Strategy Analytics’ report reviews 5G commercial developments to date and provides recommendations to operators on…