Quantum cryptography and network market is growing
Friday, May 5, 2023 by Richard Harris
The global quantum cryptography and network market was valued at US$ 698.31 million in 2022 and is projected to reach US$ 8,136.60 million by 2031 at a projected CAGR of around 32.99% during the forecast period 2023-2031. The increasing need for secure communication and data transfer, along with the rising adoption of quantum cryptography solutions by governments a...
ImmuniWeb Neuron web security scanning
Friday, June 10, 2022 by Richard Harris
ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available.
ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...
Intelligent IoT Network lands from Aeris
Tuesday, February 15, 2022 by Richard Harris
Aeris, the Internet of Things (IoT) solutions provider has announced the next generation of its Intelligent IoT Network, a unique suite of Machine Learning and Artificial Intelligence (AI)-based capabilities that enable superior global IoT connectivity and network performance, increased security performance, and best-in-class IoT network support. The Aeris Intelligent I...
Minterest deploys to Moonbeam
Friday, November 5, 2021 by Richard Harris
Minterest, a value-capturing lending and borrowing protocol designed to make DeFi fairer for users, has announced that it will be deployed on Moonbeam, an Ethereum-compatible smart contract parachain on Polkadot.
Moonbeam will provide recognized world-class technical support to assist with the protocol’s migration, while, in turn, Minterest will act as a magnet...
Business professionals see the cloud as a critical part of their jobs
Tuesday, June 22, 2021 by Brittany Hainzinger
Sixty-five percent of US business professionals now consider the cloud to be important or critical to carrying out their jobs, according to a survey by Ciena, conducted in partnership with research firm Dynata. However, it seems that home networks are falling short, as 40% plan to upgrade their residential broadband service to cope with the increased network demands of ...
Not all security vulnerabilities are created equal
Tuesday, May 25, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...
Six areas of focus for continuous security
Friday, April 16, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...
Why multi-cloud and edge deployments are hard
Monday, March 9, 2020 by Brittany Hainzinger
Volterra announced the results of a new global survey of more than 400 IT executives showing that organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments. Conducted by Propeller Insights, the survey reveals that multi-cloud deployments are being driven primarily by a need to maximize availability and reliability fo...
Best Practices for Kubernetes deployments from Portshift
Monday, January 27, 2020 by Richard Harris
Portshift presents five security best practices for DevOps and development professionals managing Kubernetes deployments. Integrating these security measures into the CI/CD pipeline will assist organizations in the detection and remediation of security issues earlier in the development process, allowing faster and shorter cycles while assuring safe and secure deployment...
SIIA CODiE Awards 2020 nominations are now open
Thursday, November 7, 2019 by Richard Harris
SIIA announced the nomination period for the 35th annual SIIA CODiE Awards. Applications, products and services and other related technologies for use by publishers, information service providers and consumers across the business technology industry are invited to apply between November 4 and January 17.
New categories in 2020
Each year SIIA stakeholders, inc...
Finding website risk levels and reputations gets easier for IT admins
Monday, May 13, 2019 by Richard Harris
NetMotion Software announced NetMotion Reputation, a subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains. Reputation allows IT teams to get visibility into user behavior, including a better understanding of access to risky or inappropriate cloud applications and websites. Customers can also block access if an...
Making IoT devices more reliable gets easier thanks to Silicon Labs
Monday, April 29, 2019 by Richard Harris
Silicon Labs has introduced the next generation of it's Wireless Gecko platform, Series 2, designed to make Internet of Things (IoT) products more powerful, efficient and reliable. Building on the leading RF and multiprotocol capabilities of the Wireless Gecko portfolio, Series 2 delivers the industry’s most versatile and scalable IoT connectivity platform. Th...
Videoselfie authentication tool launches
Tuesday, February 19, 2019 by Richard Harris
Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...
Mesh networking security from NeuVector at IBM Think 2019
Thursday, February 14, 2019 by Richard Harris
NeuVector announced a new platform integration with the Istio and Linkerd2 service meshes that expands NeuVector’s security capabilities for production Kubernetes deployments. The integration - developed in coordination with IBM Cloud and the Istio open source development team - delivers new capabilities for network visibility and threat detection, even for connec...
National Coding Week is here
Monday, September 17, 2018 by Richard Harris
National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses.
“Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...
Acumos AI Challenge sponsors to give out $100k in prizes
Thursday, July 26, 2018 by Richard Harris
AT&T and Tech Mahindra have announced that they will be sponsoring the Acumos AI Challenge, an open source developer competition that seeks innovative artificial intelligence (AI) solutions.
Working with The Linux Foundation, the companies encourage students, developers and data scientists to submit their ground-breaking AI solutions for the chance to win prize m...
New partnership emerges to simply IoT security
Wednesday, May 16, 2018 by Richard Harris
In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...
CEO Roundtable participants announced for Telecom Exchange NYC 2018
Wednesday, May 9, 2018 by Austin Harris
Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...
TapSafe warranty app launches at CES
Monday, January 15, 2018 by Richard Harris
TapSafe, a new warranty app and platform, will help consumers find, identify and protect all of their connected devices. The new product, developed by AmTrust Innovation, the products and services innovation arm of AmTrust Financial, allows users to buy warranty protection and technical support for any connected devices. Nearly three-quarters (74%) of US households have...
Overcoming IoT security threats to achieve better ROI
Monday, January 8, 2018 by Richard Harris
With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...
Cisco releases security connector app for iOS devices
Tuesday, January 2, 2018 by Austin Harris
Cisco announced the availability of Cisco Security Connector, a security app designed to give enterprises the deepest visibility and control over network activity on iOS devices, now in the App Store.Apple has designed iOS to be secure from the ground up and to be simple, intuitive, and powerful for users. By using iPhones and iPads with iOS 11 and Cisco Security Connec...
Tips for securing container deployments
Friday, September 1, 2017 by Richard Harris
Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...
The evolving role of the Network Engineer
Monday, July 31, 2017 by Grant Ho
Many network engineers still struggle to manage key IT workflows manually, including network troubleshooting, documentation, change management, and cybersecurity. Managing these workflows is becoming increasingly difficult, and the issue is only expected to escalate as networks grow and become more complex with the move towards software-defined networking (SDN) and clou...
Route the Internet faster with Argo from Cloudflare
Monday, May 22, 2017 by Richard Harris
Cloudflare has announced Argo, a service that intelligently routes traffic across the Internet for a faster, more reliable, and more secure online experience.The Internet is inherently unreliable. Its massive collection of networks from different providers experiences delays and outages all the time. Internet users experience these problems as slowness reaching websites...
Security Intelligence Platform from Exabeam launched
Thursday, February 2, 2017 by Richard Harris
Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...
Checkmarx opens beta support for Scala programming language
Wednesday, February 1, 2017 by Richard Harris
Checkmarx, an application security testing company, has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code.The added capability not only allows the detection of vulnerabilities within Scala code, but also the ability to...
NeuVector has a new approach to securing Docker containers
Wednesday, February 1, 2017 by Richard Harris
NeuVector has announced the launch and availability of a new approach to securing Docker containers. With constant behavioral learning automatically applied to security policies for containers, the platform secures containers where they have been most vulnerable: in production environments where they are constantly being deployed, updated, moved, and scaled across hosts...
The data security money pit
Wednesday, January 25, 2017 by Richard Harris
93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...
Enterprise BYOD post holiday woes
Tuesday, January 24, 2017 by Mitch Black
Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...
Ransomware facts and the steps to prevent it on your device
Friday, December 30, 2016 by Richard Harris
As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Austin Harris
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
How to secure your online accounts from cyber attacks in 2017
Wednesday, December 21, 2016 by Richard Harris
In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...
Why you should ditch traditional business software analysis
Tuesday, December 20, 2016 by Richard Harris
Competition between software companies is a fierce battle waged not with weapons, but with scalable, intuitive, and efficient solutions that can most effect their customer’s lives. The importance of a well coordinated and strategic approach to how you choose to execute your solution is perhaps one of the most fundamental necessities required to succeed in markets.That’s...
Cyberbit's SOC 3D automation updates and what you should know
Tuesday, December 20, 2016 by Richard Harris
Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...
Automatically generate network security intelligence with new tool
Monday, December 19, 2016 by Richard Harris
Logtrust, a real-time big data-in-motion firm for big data analytics, and Panda Security, a cloud-based security solution, announced the availability of the Advanced Reporting Tool (ART), which automatically generates security intelligence that allows organizations to pinpoint attacks and unusual behaviors, and detect internal misuse of systems and networks. ART's uniqu...