Cylance

BlackBerry was best known for keyboard-totting smartphones, but their demise in recent years has seen the Canadian firm pivot towards enterprise services and in particular cybersecurity. That strategy takes a big step further forward today after BlackBerry announced the acquisition of AI-based cybersecurity company Cylance for a cool $1.4 billion. Business Insider reported that a deal was close last week, and that has proven true with BlackBerry paying the full amount in cash up front. The acquisition is BlackBerry’s  largest ever and it is set to close before February 2019 — the end of BlackBerry’s current financial year — and it will see Cylance operate as a separate business unit within BlackBerry’s business. The company plansRead More →

CCTV camera.

It’s no secret that computers and phones collect information about you. If you’ve been searching something online, you’re likely to get recommendations based on whatever that item was the next time you go on Amazon or eBay. That’s not too much of a problem for most people but we constantly hear people talking about how the government are constantly tracking your phone and listening to your conversations. That’s not likely, but with so many crazy rumours flying around about online surveillance, it’s hard to separate fact from fiction. Pixabay It’s true that companies like Google are storing a fair amount of information on you butRead More →

Cloud Access Security Brokers, known as CASBs, are a new window into everyday security and safety needs of companies that increasingly serve cloud-focused applications and services that can kept much more secure with the help of CASB platforms. Gartner Inc., has recently announced a few technological advances for information security and defines Cloud access security brokers (CASBs) as on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, credential mapping,Read More →