More effect network security can directly enable healthcare organizations to achieve the potential value of digital health technologies.
Our latest mentions and contributions to news articles and other journalism postings.
Thirty-Five Organizations From Tech, Finance, Energy, and Biotech Join The Linux Foundation and Invest in Open Source Technology
Linux Foundation Silver members are organizations that contribute to or otherwise support open source communities and projects.
A new adaptive approach to security can directly enable more effective security capabilities, but also enable greater operational and financial val
BlackRidge & Agile Fractal Grid showcase security-as-a-service (SECaaS) platform to some 400 electric utility co-ops & municipal utilities.
At last week's Gartner Security Summit, analyst Neil MacDonald outlined 10 cybersecurity projects to reduce enterprise security risk.
Hyperledger, an open source collaboration to advance cross-industry blockchain technologies, announced 16 new members including BlackRidge
If you haven’t already heard, the age of digital health is upon us. And for healthcare providers, patients and consumers, it’s about time.
At IoT World Conference in Santa Clara, the IoT Forum met and Doug Johnson presented presented on the topic of Transport Layer Security for IIoT.
As a student researcher and developer, Alissa Sytsma collaborated with BlackRidge, Marist faculty and IT to jointly develop a blockchain app.
BlackRidge Technology,a provider of next generation cyber defense solutions, has announced it has joined the Telecom Council, the company said.
Japan-based network and cybersecurity provider Nihon Cornet Technology will work with global cyber defense provider BlackRidge technology.
A challenge with deploying intelligent sensors is that they must not provide a new attack surface that is vulnerable to compromise.
IIoT published a white paper excerpt on on two key capabilities in the advancement of network security and cyber defense.
BlackRidge Technology has appointed four executives to its newly established government advisory board.
Tech Company News interviews Mike Miracle on the new BlackRidge software release that is in beta test.
CEO Insights - Industrial Companies Face Cybersecurity Challenges That Span the Full IT-OT-IIoT Spectrum
IIoT World interviews Bob Graham on the IIoT cybersecurity challenges we face.
As the Industrial IoT proliferates and converges with enterprise IT, CSOs and CIOs need to assess the risks with their growing attack surface.
Rob Hubbards's blog was published on IIoT World as part of their thought leadership article.
Whit Diffie, a key BlackRidge adviser, elected to The Royal Society for the invention of public key cryptography and his contributions to privacy.
Mike Miracle of BlackRidge shares his thoughts on mainframe and blockchain security and how new technologies can further bolster cyber defenses.
BlackRidge Technology is included in the microsegmentation and software-defined perimeter categories.
BlackRidge advisor Mark Graff was quoted about the leaked
Cyber defense automation is imperative given bad actors, and rogue nations continually use more sophisticated techniques to disrupt and steal vital
In this batch of data, the information that has been released may still be turned into a weapon, noted John Hayes, CTO of BlackRidge Technology.
Whitfield Diffie, adviser to BlackRidge, was elected to the NAE for the invention of public key cryptography and his contributions to privacy.
Doug Maughan, of the DHS Science and Technology Directorate, welcomed and introduced the companies honored as this year's SINET 16 innovators.
BlackRidge is part of this year’s SINET 16 Innovators, chosen from 82 applicants representing nine countries.
Story based on BlackRidge advisor Mark Graff’s keynote at NYIT Cybersecurity Conference. Mark concludes that our wildly disorganized, motley feder
BlackRidge Technology selected as 2016 SINET 16 Innovator, and to present at the SINET Showcase in Washington, DC, Nov. 2 – 3, 2016.
John Hayes, Founder and CTO of BlackRidge Technology, will be speaking at the first in a series of innovative cyber security technology showcases a
“When we turned on the BlackRidge equipment on our network…to protect certain servers, they literally disappeared off the network, and the honeypot
BlackRidge announced it has a new channel partner, Alliance Technology Group, a national solutions integrator for security, cloud, and infrastructu
If you were able to identify and authenticate who is attempting to connect to severs and cloud resources, you could respond only to those that you
BlackRidge revealed advancements to its identity-based network security and has joined Ready for IBM Security Intelligence Partner Programme for z
IBM announced the addition of BlackRidge Technology, Forcepoint and RSM Partners to its Ready for IBM Security Intelligence partner programme.
IBM's new partners for z Systems include BlackRidge, Forcepoint (a joint venture of Raytheon and Vista Equity Partners) and RSM Partners.
The ISVs IBM has partnered with are BlackRidge Technology, RSM Partners and Forcepoint, which offer technologies in the area of identity-based netw
IBM noted that it is also expanding its use of security partners, adding BlackRidge Technology for network security.
In addition to the new mainframe, IBM announced an expanded security partner ecosystem.
BlackRidge Technology, provider of identity-based network and cyber security solutions, recently received IBM PartnerWorld’s Ready for IBM Security
BlackRidge partnered with Marist to utilize the multi-platform test beds and to attempt to implement its security solution within the Marist privat
“Security challenges are now among the biggest impediments to deploying public and hybrid cloud architectures for enterprise workloads,” said Josh
Poughkeepsie-based Marist College and BlackRidge Technology have announced a research partnership to develop advanced cybersecurity capabilities.
Marist College said it is working with BlackRidge Technology on several initiatives.The institution implemented BlackRidge’s First Packet Authentic
At the Directions 2015 conference in Reno, EDAWN (Economic Development Authority of Western Nevada) and NNDA (Northern Nevada Development Authority
Ciena has launched an NFV platform that will let service providers offer a catalog of on-demand virtual network services in a “pay-as-you-earn” bus
New Ciena Agility division delivers turnkey solutions that enable service providers to offer virtualized network functions as on-demand, consumptio
Ciena launched a new virtualized software platform and virtual network functions marketplace, as well as a new software-focused business division.V
Ciena Agility Matrix allows both MSPs and their customers to fully benefit from virtualization technology and the business models enabled by it.
SDN is built on openness, and as with any open system, security must be a top consideration.
Coordinated Denial of Service attacks on U.S.
The Coming Identity Based Network Management Revolution; Interview with BlackRidge Technology CTO John Hayes, Part III
Since the advent of the TCP/IP protocol, network administrators have had a major blind spot: the ability to reliably determine the identity of an i
Star Trek fans can remember vividly the image of a Romulan “Bird of Prey” appearing out of nowhere to attack, using its ‘cloaking’ technology to re
SANTA CLARA, Calif.—(BUSINESS WIRE)—McAfee today announced eight new partners have joined the McAfee® Security Innovation Alliance (SIA), McAfee’s
Sypris Electronics LLC announced today that it has entered into a strategic partnership with BlackRidge Technology, a supplier of Identity Aware Ne
The Internet of things, otherwise known as machine to machine (M2M) communication, is “out of control”, opening the door for disasters if someone d
Why VPNs and RSA Key ID Security Break Down When Authenticating Headless Devices; Interview with BlackRidge Technology CTO John Hayes, Part II
The world of machine-based data collection is creating an entirely new type of security problem: authenticating machines that have no formal user i
Possibly the best way to keep hackers and crooks out of a server or a corporate network is simply to keep those resources hidden from view.
Imagine driving your car down a twisty country road.
The Three Practical Use Cases for Network Layer Identification; Interview with BlackRidge Technology CTO John Hayes Part I
Followers of my previous blog entries should recognize the next company in DCIG’s Executive Interview series. I have previously discussed both the
In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day.
The ubiquitous username and password authentication scheme has been with us since the early days of the Internet. Since then, the Internet has gro
One of the more exciting products to come out of this year’s VMworld 2011 conference was a phone. This “phone” went well beyond the push-button, t
A few weeks ago I posted a blog entry suggesting that network perimeter security had begun to break down with the advent of the cloud and the use o