Cisco Buys Security CompanyCisco is paying $12 million in stock to purchase Psionic Software, a Texas company whose products help detect network intrusions, according to an article in the San Franciso Chronicle. The Chronicle reports that Psionic’s strength is that its product has fewer false alarms than that of competitors.Butterflies Are Free But IllegalNew York Times. The Times reports that the city’s Transportation Department has instructed Microsoft to remove the decals.The large adhesive butterfly stickers that a Microsoft marketing campaign has been placing all over New York are illegal, according to an article in today’s Video Monitors Trigger Alarms A Virginia firm that had developed products for streaming video has repositioned itself as a security vendor of systems in which video monitors detect motion and ring alarms, according to an article in the Washington Post. The Post reports that ObjectVideo is now pitching its products to airports, power plants and oil refineries. Related content news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Certifications Certifications news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software news Sysdig unveils cloud attack graph based on real-time threat data Sysdig also announced a new cloud inventory and agentless scanning capabilities to tackle cloud security risks. By Michael Hill Sep 27, 2023 3 mins Threat and Vulnerability Management Cloud Security Storage Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe