Millie
your market intelligence analyst
Search Results
Edit Save
3,621 results
Global Security 06/27/2019 03:25
Crossword Cybersecurity plc. has announced that the Nursing and Midwifery Council (NMC), will use Rizikon Assurance to automate its supplier onboarding process and manage ongoing supplier risk. The NMC is the regulator of over 690,000 nurses, midwives and nursing associates across the UK. All organisations need their suppliers to provide assurance that they have sufficient controls in place to manage financial, operational and regulatory risk. The NMC, which has over 600 suppliers, will (...). -. Market News.
Global Security 06/27/2019 03:22
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY The security of Microsoft Exchange Server was improved. Impacted products: Exchange. Severity: 1/4. Consequences: no consequence. Provenance: internet client. Confidence: confirmed by the editor (5/5). Creation date: 12/06/2019. DESCRIPTION OF THE VULNERABILITY This bulletin is about a security improvement. It does not describe a vulnerability. (...). -. Security Vulnerability.
Global Security 06/27/2019 03:06
HomeSecure – the smart home monitoring company – has announced a partnership with Ireland's iKydz that will extend smart monitoring to help parents manage their children's screen time and protect them from possibly harmful online content. Whether it be at home or on a child's mobile or tablet device. This partnership, the first of its kind in Europe, will see HomeSecure offer the iKydz service as a convenient add-on to its current home monitoring service. “Allowing parents to take their (...). -. Business News.
Global Security 06/27/2019 03:04
ADVA announced that Axians UK has selected the ADVA Ensemble software suite to provide its customers with risk-free access to network functions virtualization (NFV) services. Deployed as a managed platform for hosting virtual network functions (VNFs) and user applications at customer sites, the technology enables enterprises and communication service providers (CSPs) to rapidly harness the benefits of virtualization with minimal upfront investment. Axians UK is leveraging ADVA Ensemble (...). -. Market News.
Global Security 06/27/2019 02:27
Cibernos Group and Proact announce an agreement for the acquisition of the spanish subsidiary of Proact. With this acquisition, Cibernos Group continues with its expansion strategy, both national and international, strengthening its capabilities and expanding its geographical location. Proact's wholly owned subsidiary in Spain was established through the acquisition of Databasement International. in 2011. Under the agreement, Cibernos will continue to serve current Proact customers in (...). -. Business News.
Global Security 06/26/2019 11:23
Ping Identity announced updates to its multi-factor authentication (MFA) solution, PingID, providing new methods to mitigate risk and strengthen security for enterprises. PingID's new features include ways to evaluate user and device risk before access is granted, as well as support for Fast Identity Online (FIDO) standards to increase resistance to advanced phishing attacks. With phishing resistant and user-friendly authentication methods—including biometric authenticators, such as facial (...). -. Business News.
Global Security 06/26/2019 09:33
Following the fine imposed by the French Data Protection Authority[1] (the "CNIL") to Google and its condemnation in first instance, on UFC-Que Choisir's initiative, for unfair terms relating to Data Protection[2], our association has initiated today a class action against Google before the Tribunal de Grande Instance of Paris, for GDPR (General Data Protection Regulation) infringements.
Global Security 06/26/2019 09:13
Cohesity announced results of a global survey of 900 senior IT decision makers that shows a major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired. More than 9 in 10 of respondents across Australia, France, Germany, Japan, the United Kingdom and the United States believed when they started their journey to the cloud it would simplify operations, increase agility, reduce costs, and provide greater (...). -. Special Reports.
Global Security 06/26/2019 09:05
Finastra announced that it has partnered with Xceptor, an intelligent automation software company, to offer new reconciliation functionality to its securities market customers. Thanks to an out-of-the-box reconciliation functionality, Finastra's Fusion Markets customers will now be able to automatically reconcile and validate transactions and positions data, including harder-to-handle formats, in a single solution resulting in reduced manual workloads, exceptions and breaks, and improved (...). -. Product Reviews.
Global Security 06/26/2019 08:17
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can use several vulnerabilities of OTRS Help Desk. Impacted products: Debian, OTRS Help Desk. Severity: 2/4. Consequences: privileged access/rights, user access/rights, data reading. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 26/04/2019. DESCRIPTION OF THE VULNERABILITY Several vulnerabilities were (...). -. Security Vulnerability.
Global Security 06/26/2019 05:39
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: WordPress Plugins not comprehensive. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 26/04/2019. DESCRIPTION OF THE VULNERABILITY An attacker can bypass the filtering against Cross Site Scripting from WordPress WordFence WA, in order to run (...). -. Security Vulnerability.
Global Security 06/26/2019 05:20
Veracode's State of Software Security report (SoSS) revealed the healthcare sector is the fastest industry when it comes to addressing common vulnerabilities found in software. The global report found healthcare organisations took only six days to address a quarter of their vulnerabilities in code and just seven months (216 days) to remediate the majority (75%) of vulnerabilities. That's almost eight months faster than the average organisation who is taking 15 months (472 days) to fix 75% of (...). -. Special Reports.
Global Security 06/26/2019 04:56
Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. This is a new feature that you can use with your existing Virtual Private Clouds (VPCs) to capture and inspect network traffic at scale. This will allow you to: (...). -. Product Reviews.
Global Security 06/26/2019 04:29
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Debian, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES. Severity: 2/4. Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: (...). -. Security Vulnerability.
Global Security 06/26/2019 04:10
Cyber security provider F-Secure is creating a new unit dedicated to building on the company's tradition of providing the best protection in the industry. The new team, called the Tactical Defense Unit, comprises of researchers and analysts responsible for operationalizing holistic protection strategies that ensure F-Secure's award-winning products and services evolve faster than the threats facing people and organizations. The new unit is headed by F-Secure Vice President Christine (...). -. Malware Update.
Global Security 06/26/2019 04:03
VTT Technical Research Centre of Finland and Saab have signed a framework agreement with the aim to strengthen research co-operation in mutually interesting technology areas, thereby ensuring security of supply of critical technologies. Identified technologies include materials and sensors that are critical across Saab's product portfolio. While Saab and VTT have been working together for a number of years, the recently signed agreement further strengthens this co-operation. Planned (...). -. Business News.
Global Security 06/25/2019 11:38
Ping Identity announced a significant update to PingOne for Customers, the cloud-delivered Identity-as-a-Service (IDaaS) offering built for developers. The API-first solution can now deliver seamless and secure push notifications from custom mobile applications that can be used for passwordless and advanced multi-factor authentication. The cloud identity solution helps development teams speed time to launch for their applications, while also taking security concerns off their plates and (...). -. Product Reviews.
Global Security 06/25/2019 09:45
Bittium has been granted the ISO 27001:2013 Information Security Management Certificate that includes Bittium's business and support processes, information security, personnel and premises safety, as well as continuous improvement methods. ISO 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and (...). -. Product Reviews.

Health Care

Health and Wellness

Business Issues

Companies - Public

Companies - Venture Funded

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Insurance

Information Technologies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications