Millie
your market intelligence analyst
Search Results
Edit Save
3,524 results
Global Security 08/16/2019 02:49
Accelerating demand for embedded security in industrial and automotive segments is driving the market for technologies such as secure microcontrollers (MCU) and trusted platform modules (TPM). ABI Research, a global tech market advisory firm, forecasts that total global shipments of secure embedded hardware will double by 2023, surpassing the 4 billion mark. TPMs are finally gaining momentum, notably in new industrial markets, after more than a decade since its standardization. It had (...). -
Global Security 08/16/2019 02:44
StackRox announced that The StackRox Kubernetes Security Platform is now available on the Google Cloud Platform (GCP) Marketplace. GCP customers can now launch the StackRox platform with only a few clicks for simplified deployment on Google Kubernetes Engine (GKE) or with self-managed Kubernetes on GCP. StackRox provides security capabilities across all phases of the container life cycle – build, deploy and runtime. StackRox also integrates with Google Cloud Security Command Center (Cloud (...). -
Global Security 08/16/2019 02:38
Ping Identity announced that Kevin Sellers has joined the company's leadership team as global chief marketing officer. Sellers leads all aspects of the company's marketing function, with a focus on accelerating expansion in the enterprise market and growing Ping's brand globally. An accomplished business leader with a strong track record of scaling global brands, Sellers brings more than 20 years of global marketing leadership experience in the technology sector, including 10 years living and (...). -
Global Security 08/15/2019 05:41
Access Control Academy returns to Moscow in November 21, 2019 for the 4th time this year to drive adoption of technologies that are pitched as affordable and more efficient alternatives to traditional access control strategies in Russia. In 2019, focus topics and sessions include: • mobile access control (smartphone-based access control); • biometric identification; • open-platform security solutions with integrated access control; • cybersecurity and multi-level data protection; • (...). -
Global Security 08/14/2019 16:09
Following today's news of Biostar 2 exposing a million fingerprints online, Kelvin Murray, Senior Threat Researcher at Webroot, has prepared a comment regarding the significance of this leak. “The fact that this biometric data was stored plainly and not in hashed form raises some serious concerns and is unacceptable. Biometrics deserve greater privacy protections than traditional credentials, they're part of you and there's no resetting a fingerprint or face. Once fingerprint and facial (...). -
Global Security 08/14/2019 11:00
Today marks the launch of NetAlly®, a new company comprised of a team that has been developing highly recognized and respected brands of portable network test solutions for over 25 years. Formerly a business unit of NETSCOUT®, and previously part of Fluke Networks®, the company is now an independent provider of handheld testing solutions including the LinkSprinter® Pocket Network Tester, LinkRunner® Network Auto-Tester, OneTouch™ AT Network Assistant, AirCheck™ G2 Wireless Tester, and AirMagnet® (...). -
Global Security 08/14/2019 10:57
After months of excessive testing by internal & external research teams, SCADAfence Platform's version 5.9 consistently demonstrated best-in-class performance and provided 100% detection and prevention with close to zero false positives. But that's not all that's new in this release. SCADAfence 5.9 Proactive Capabilities In today's digitized & hyperconnected world, technology moves faster than our imaginations can keep up with. This means that in an OT environment, there are newer (...). -
Global Security 08/14/2019 10:52
A new survey by Trūata highlights that customers are more worried than ever about the way their data is used and shared by companies, particularly for analytics. The Trūata Customer State of Mind Survey discovered that 60% of customers are uneasy with companies using their personal data for analytics. Recent high-profile data leaks have also added to this negative perception of the way personal data is managed by brands. In fact, more than seven in ten (71%) internet users are worried that (...). -
Global Security 08/14/2019 06:11
Kaspersky has received a patent (US10339301) from the United States Patent and Trademark Office for a technology designed to simplify the detection of malicious functionality in a virtual machine. By creating the exact conditions that trigger malware execution, this patented know-how allows researchers to analyse a suspicious file in a single attempt instead of trying it multiple times. When implemented, the technology is predicted to increase the detection rate of sandboxing and automates (...). -
Global Security 08/14/2019 06:09
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu. Severity: 2/4. Consequences: administrator access/rights, denial of service on server, denial of service on service. Provenance: user shell. Confidence: confirmed by the editor (5/5). Creation date: 14/06/2019. DESCRIPTION OF THE VULNERABILITY An attacker can force the (...). -
Global Security 08/14/2019 05:30
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Fedora, jQuery Core. Severity: 2/4. Consequences: user access/rights, client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 14/06/2019. DESCRIPTION OF THE VULNERABILITY An attacker can use a vulnerability via eval() of jQuery jsTree, in order to run code. ACCESS TO THE FULL VIGIL@NCE (...). -
Global Security 08/13/2019 16:03
Headquartered in Zurich, Switzerland with a test lab in Israel, 1702ai's team is composed of a dozen people, spread accross three continents including North America. 1702ai video analytic tool connects to any CCTV stream and is able to detect weapons such as guns and knives in real-time. CEO and founder Joachim Levy, describes his system as a second pair of eyes which is currently much needed for any video surveillance system. Global Security Mag: Can you introduce 1702ai: Joachim (...). -. /
Global Security 08/13/2019 11:21
BitSight announced BitSight Enterprise Analytics, the latest Security Performance Management solution available on the BitSight platform. BitSight Enterprise Analytics helps security and risk leaders quickly gain insight into the impact of risk introduced at the organisational group level – from subsidiaries to business units and departments – enabling them to identify the areas of highest risk concentration within their organisations. The solution provides visibility into which groups have (...). -
Global Security 08/13/2019 11:18
NTT Security, the specialised security company of NTT Group, has signed a Memorandum of Understanding (MoU) with Europol's European Cybercrime Centre (EC3). This latest move forms part of its committment to sharing its strategic threat intelligence with industry partners and law enforcement agencies to prevent cybercrime globally. The new MoU defines a framework for NTT Security and Europol to exchange strategic threat intelligence as well as information relating to cybersecurity trends and (...). -
Global Security 08/13/2019 07:31
Tufin® announced two additions to its Leadership Team: Cloud General Manager Larry Alston and CIO Michal Lewy-Harush. Larry Alston has been named General Manager of Cloud at Tufin. Alston previously held senior and executive management roles at Teradata, Altisource, FuseSource, IONA, and Excelon. As Tufin champions the adoption of security policy management in the cloud, Alston will be responsible for all aspects of Tufin's cloud-native business. “As organizations adopt cloud platforms (...). -
Global Security 08/13/2019 06:09
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES. Severity: 2/4. Consequences: user access/rights, data flow. Provenance: user account. Confidence: confirmed by the editor (5/5). Creation date: 13/06/2019. DESCRIPTION OF THE VULNERABILITY An attacker can bypass restrictions via Unreadable GPO of sssd, in order to escalate his (...). -
Global Security 08/13/2019 06:06
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can trigger a Cross Site Request Forgery via Web UI of Cisco IOS XE, in order to force the victim to perform operations. Impacted products: Cisco ASR, Cisco Catalyst, IOS XE Cisco, Cisco Router. Severity: 2/4. Consequences: user access/rights. Provenance: internet client. Confidence: confirmed by the editor (5/5). Creation date: 13/06/2019. (...). -

Therapeutic Areas

Clinical Trials and Phases

Business Issues

Companies - Public

Companies - Venture Funded

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Cell Receptors

Cells

Diagnostics and Therapeutics

Diseases

Drugs - Brand Names

Drugs - Generic

Enzymes

Genes

Health Care

Health and Wellness

Human Anatomy

Mechanisms of Action

Medical Devices

Proteins

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications