Cyber defense automation is imperative given bad actors, and rogue nations continually use more sophisticated techniques to disrupt and steal vital
Our latest mentions and contributions to news articles and other journalism postings.
In this batch of data, the information that has been released may still be turned into a weapon, noted John Hayes, CTO of BlackRidge Technology.
Whitfield Diffie, adviser to BlackRidge, was elected to the NAE for the invention of public key cryptography and his contributions to privacy.
BlackRidge is part of this year’s SINET 16 Innovators, chosen from 82 applicants representing nine countries.
Story based on BlackRidge advisor Mark Graff’s keynote at NYIT Cybersecurity Conference. Mark concludes that our wildly disorganized, motley feder
BlackRidge Technology selected as 2016 SINET 16 Innovator, and to present at the SINET Showcase in Washington, DC, Nov. 2 – 3, 2016.
John Hayes, Founder and CTO of BlackRidge Technology, will be speaking at the first in a series of innovative cyber security technology showcases a
“When we turned on the BlackRidge equipment on our network…to protect certain servers, they literally disappeared off the network, and the honeypot
BlackRidge announced it has a new channel partner, Alliance Technology Group, a national solutions integrator for security, cloud, and infrastructu
If you were able to identify and authenticate who is attempting to connect to severs and cloud resources, you could respond only to those that you
BlackRidge revealed advancements to its identity-based network security protection offering, and has also joined the Ready for IBM Security Intelli
IBM today also announced several new partners for its “Ready for IBM Security Intelligence” program.
IBM has designed its latest mainframe to address the challenges stopping hybrid cloud from becoming the de facto model of enterprise computing…whic
IBM claims its newest z13s server family —announced today at the IBM PartnerWorld Leadership Conference 2016—dovetails with hybrid cloud transactio
The ISVs IBM has partnered with are BlackRidge Technology, RSM Partners and Forcepoint, which offer technologies in the area of identity-based netw
IBM noted that it is also expanding its use of security partners, adding BlackRidge Technology for network security.
In addition to the new mainframe, IBM announced an expanded security partner ecosystem.
IBM is also partnering with security companies BlackRidge and Forcepoint, and RSM Partners for additional security features.
BlackRidge Technology, provider of identity-based network and cyber security solutions, recently received IBM PartnerWorld’s Ready for IBM Security
BlackRidge partnered with Marist to utilize the multi-platform test beds and to attempt to implement its security solution within the Marist privat
“Security challenges are now among the biggest impediments to deploying public and hybrid cloud architectures for enterprise workloads,” said Josh
Poughkeepsie-based Marist College and BlackRidge Technology have announced a research partnership to develop advanced cybersecurity capabilities.
Marist College said it is working with BlackRidge Technology on several initiatives.The institution implemented BlackRidge’s First Packet Authentic
At the Directions 2015 conference in Reno, EDAWN (Economic Development Authority of Western Nevada) and NNDA (Northern Nevada Development Authority
Ciena has launched an NFV platform that will let service providers offer a catalog of on-demand virtual network services in a “pay-as-you-earn” bus
New Ciena Agility division delivers turnkey solutions that enable service providers to offer virtualized network functions as on-demand, consumptio
Ciena launched a new virtualized software platform and virtual network functions marketplace, as well as a new software-focused business division.V
Ciena Agility Matrix allows both MSPs and their customers to fully benefit from virtualization technology and the business models enabled by it.
SDN is built on openness, and as with any open system, security must be a top consideration.
Coordinated Denial of Service attacks on U.S.
The Coming Identity Based Network Management Revolution; Interview with BlackRidge Technology CTO John Hayes, Part III
Since the advent of the TCP/IP protocol, network administrators have had a major blind spot: the ability to reliably determine the identity of an i
Star Trek fans can remember vividly the image of a Romulan “Bird of Prey” appearing out of nowhere to attack, using its ‘cloaking’ technology to re
SANTA CLARA, Calif.—(BUSINESS WIRE)—McAfee today announced eight new partners have joined the McAfee® Security Innovation Alliance (SIA), McAfee’s
Sypris Electronics LLC announced today that it has entered into a strategic partnership with BlackRidge Technology, a supplier of Identity Aware Ne
The Internet of things, otherwise known as machine to machine (M2M) communication, is “out of control”, opening the door for disasters if someone d
Why VPNs and RSA Key ID Security Break Down When Authenticating Headless Devices; Interview with BlackRidge Technology CTO John Hayes, Part II
The world of machine-based data collection is creating an entirely new type of security problem: authenticating machines that have no formal user i
Possibly the best way to keep hackers and crooks out of a server or a corporate network is simply to keep those resources hidden from view.
Imagine driving your car down a twisty country road.
The Three Practical Use Cases for Network Layer Identification; Interview with BlackRidge Technology CTO John Hayes Part I
Followers of my previous blog entries should recognize the next company in DCIG’s Executive Interview series. I have previously discussed both the
In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day.
The ubiquitous username and password authentication scheme has been with us since the early days of the Internet. Since then, the Internet has gro
One of the more exciting products to come out of this year’s VMworld 2011 conference was a phone. This “phone” went well beyond the push-button, t
A few weeks ago I posted a blog entry suggesting that network perimeter security had begun to break down with the advent of the cloud and the use o