beSECURE Partners with Portnox to Control Access to Networks

This article was originally published on EIN Presswire on April 6, 2020. SACRAMENTO, CALIFORNIA, UNITED STATES, April 6, 2020 /EINPresswire.com/ — Beyond Security, a pioneer in automated penetration testing and vulnerability scanning, announced today that it has partnered with Portnox, a market leader in next-generation network access control (NAC) solutions. The partnership offers a seamless integration between Beyond Security’s beSECURE and […]

Read More… from beSECURE Partners with Portnox to Control Access to Networks

Is Automation the Future of Pen Testing?

This article was originally published on Enterprise Management 360 on March 31, 2020. Penetration testing is the Marmite of cybersecurity: you either love it or you hate it. Taking a neutral stance on the matter, it’s easy to see both sides. On one hand, pen testing provides indisputable evidence of vulnerabilities for organisations to action. Pen testers […]

Read More… from Is Automation the Future of Pen Testing?

How to Manage Your Employees’ Devices When Remote Work Has Become the New Norm

Across the world, companies like Google, Microsoft, Amazon, Twitter, and yes, Beyond Security, have asked their employees to work from home in response to the Coronavirus (Covid-19) pandemic.  As employees move from on-premises offices to their homes, businesses will be faced with the challenge of managing and securing both company-owned and employee-owned devices as they access company resources […]

Read More… from How to Manage Your Employees’ Devices When Remote Work Has Become the New Norm

The 5 Human Elements Of Cybersecurity Every CSO Should Review

On one level, cybersecurity is all about electronics – securing machines, networks and so forth. But, even the most technologically advanced cyber attacks are driven by human motivation. Humans motivate cyberattacks, and humans also, often unknowingly, facilitate cyberattacks. People are essential to mounting a defence as well  – as much as automated tools are a powerful barrier. […]

Read More… from The 5 Human Elements Of Cybersecurity Every CSO Should Review

Beyond Security to Unveil beSECURE-OT: Vulnerability Management for Operational Technology Networks at the RSA 2020

This article was originally published on EIN Presswire on February 10, 2020. SACRAMENTO, CA, USA, February 10, 2020 /EINPresswire.com/ —Beyond Security, a leading provider of automated security testing and compliance solutions, announced today that their flagship product, beSECURE, has been updated with additional features for operational technology (OT) networks. The new product, beSECURE OT, will be unveiled at […]

Read More… from Beyond Security to Unveil beSECURE-OT: Vulnerability Management for Operational Technology Networks at the RSA 2020

How to Protect Your Business from OT Security Threats

Cybersecurity threats are growing in size and prevalence  – and the nature of cybersecurity is continuously shifting. In particular, operational technology (OT) such as industrial control systems – e.g. SCADA – are newly at risk. In this article we discuss why OT is so vulnerable, what vulnerabilities you should watch out for and what your […]

Read More… from How to Protect Your Business from OT Security Threats

Data Privacy in the Age of Regulations

This past year was a big year for data breaches, new privacy laws and cracking down on existing regulations. British Airways faces a £183m fine after hackers stole credit card details from nearly 400,000 customers. Many other big names were hit too. Facebook. Equifax. Twitter. Marriott. Google. They’ve all been hacked.  The reason? Sometimes it was due to […]

Read More… from Data Privacy in the Age of Regulations

In Vulnerability Assessment, Accuracy Is Vital

Testing for behavior vs version The primary requirement for a Vulnerability Assessment solution is accurate testing. Ease of use and clear reports are important, but if accuracy isn’t there then little else matters. Poor accuracy in Vulnerability Assessment produces two kinds of testing error. Overlooking a vulnerability (a false negative) leaves a security flaw you […]

Read More… from In Vulnerability Assessment, Accuracy Is Vital