network security

network security news search results

Developer news items we found relating to network security

35 results
Quantum-cryptography-and-network-market-is-growing

Quantum cryptography and network market is growing


Friday, May 5, 2023 by

The global quantum cryptography and network market was valued at US$ 698.31 million in 2022 and is projected to reach US$ 8,136.60 million by 2031 at a projected CAGR of around 32.99% during the forecast period 2023-2031. The increasing need for secure communication and data transfer, along with the rising adoption of quantum cryptography solutions by governments a...


ImmuniWeb-Neuron-web-security-scanning

ImmuniWeb Neuron web security scanning


Friday, June 10, 2022 by

ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available. ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...


Intelligent-IoT-Network-lands-from-Aeris

Intelligent IoT Network lands from Aeris


Tuesday, February 15, 2022 by

Aeris, the Internet of Things (IoT) solutions provider has announced the next generation of its Intelligent IoT Network, a unique suite of Machine Learning and Artificial Intelligence (AI)-based capabilities that enable superior global IoT connectivity and network performance, increased security performance, and best-in-class IoT network support. The Aeris Intelligent I...


Minterest-deploys-to-Moonbeam

Minterest deploys to Moonbeam


Friday, November 5, 2021 by

Minterest, a value-capturing lending and borrowing protocol designed to make DeFi fairer for users, has announced that it will be deployed on Moonbeam, an Ethereum-compatible smart contract parachain on Polkadot. Moonbeam will provide recognized world-class technical support to assist with the protocol’s migration, while, in turn, Minterest will act as a magnet...


Business-professionals-see-the-cloud-as-a-critical-part-of-their-jobs

Business professionals see the cloud as a critical part of their jobs


Tuesday, June 22, 2021 by

Sixty-five percent of US business professionals now consider the cloud to be important or critical to carrying out their jobs, according to a survey by Ciena, conducted in partnership with research firm Dynata. However, it seems that home networks are falling short, as 40% plan to upgrade their residential broadband service to cope with the increased network demands of ...


Not-all-security-vulnerabilities-are-created-equal

Not all security vulnerabilities are created equal


Tuesday, May 25, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...


Six-areas-of-focus-for-continuous-security

Six areas of focus for continuous security


Friday, April 16, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...


Why-multi-cloud-and-edge-deployments-are-hard

Why multi-cloud and edge deployments are hard


Monday, March 9, 2020 by

​Volterra announced the results of a new global survey of more than 400 IT executives showing that organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments. Conducted by Propeller Insights, the survey reveals that multi-cloud deployments are being driven primarily by a need to maximize availability and reliability fo...


Best-Practices-for-Kubernetes-deployments-from-Portshift

Best Practices for Kubernetes deployments from Portshift


Monday, January 27, 2020 by

Portshift presents five security best practices for DevOps and development professionals managing Kubernetes deployments. Integrating these security measures into the CI/CD pipeline will assist organizations in the detection and remediation of security issues earlier in the development process, allowing faster and shorter cycles while assuring safe and secure deployment...


SIIA-CODiE-Awards-2020-nominations-are-now-open

SIIA CODiE Awards 2020 nominations are now open


Thursday, November 7, 2019 by

SIIA announced the nomination period for the 35th annual SIIA CODiE Awards. Applications, products and services and other related technologies for use by publishers, information service providers and consumers across the business technology industry are invited to apply between November 4 and January 17. New categories in 2020 Each year SIIA stakeholders, inc...


Finding-website-risk-levels-and-reputations-gets-easier-for-IT-admins

Finding website risk levels and reputations gets easier for IT admins


Monday, May 13, 2019 by

NetMotion Software announced NetMotion Reputation, a subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains. Reputation allows IT teams to get visibility into user behavior, including a better understanding of access to risky or inappropriate cloud applications and websites. Customers can also block access if an...


Mesh-networking-security-from-NeuVector-at-IBM-Think-2019

Mesh networking security from NeuVector at IBM Think 2019


Thursday, February 14, 2019 by

NeuVector announced a new platform integration with the Istio and Linkerd2 service meshes that expands NeuVector’s security capabilities for production Kubernetes deployments. The integration - developed in coordination with IBM Cloud and the Istio open source development team - delivers new capabilities for network visibility and threat detection, even for connec...


National-Coding-Week-is-here

National Coding Week is here


Monday, September 17, 2018 by

National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses. “Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...


Acumos-AI-Challenge-sponsors-to-give-out-$100k-in-prizes

Acumos AI Challenge sponsors to give out $100k in prizes


Thursday, July 26, 2018 by

AT&T and Tech Mahindra have announced that they will be sponsoring the Acumos AI Challenge, an open source developer competition that seeks innovative artificial intelligence (AI) solutions. Working with The Linux Foundation, the companies encourage students, developers and data scientists to submit their ground-breaking AI solutions for the chance to win prize m...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


CEO-Roundtable-participants-announced-for-Telecom-Exchange-NYC-2018

CEO Roundtable participants announced for Telecom Exchange NYC 2018


Wednesday, May 9, 2018 by

Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...


TapSafe-warranty-app-launches-at-CES

TapSafe warranty app launches at CES


Monday, January 15, 2018 by

TapSafe, a new warranty app and platform, will help consumers find, identify and protect all of their connected devices. The new product, developed by AmTrust Innovation, the products and services innovation arm of AmTrust Financial, allows users to buy warranty protection and technical support for any connected devices. Nearly three-quarters (74%) of US households have...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


Cisco-releases-security-connector-app-for-iOS-devices

Cisco releases security connector app for iOS devices


Tuesday, January 2, 2018 by

Cisco announced the availability of Cisco Security Connector, a security app designed to give enterprises the deepest visibility and control over network activity on iOS devices, now in the App Store.Apple has designed iOS to be secure from the ground up and to be simple, intuitive, and powerful for users. By using iPhones and iPads with iOS 11 and Cisco Security Connec...


Tips-for-securing-container-deployments

Tips for securing container deployments


Friday, September 1, 2017 by

Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...


The-evolving-role-of-the-Network-Engineer

The evolving role of the Network Engineer


Monday, July 31, 2017 by

Many network engineers still struggle to manage key IT workflows manually, including network troubleshooting, documentation, change management, and cybersecurity. Managing these workflows is becoming increasingly difficult, and the issue is only expected to escalate as networks grow and become more complex with the move towards software-defined networking (SDN) and clou...


Route-the-Internet-faster-with-Argo-from-Cloudflare

Route the Internet faster with Argo from Cloudflare


Monday, May 22, 2017 by

Cloudflare has announced Argo, a service that intelligently routes traffic across the Internet for a faster, more reliable, and more secure online experience.The Internet is inherently unreliable. Its massive collection of networks from different providers experiences delays and outages all the time. Internet users experience these problems as slowness reaching websites...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


Checkmarx-opens-beta-support-for-Scala-programming-language

Checkmarx opens beta support for Scala programming language


Wednesday, February 1, 2017 by

Checkmarx, an application security testing company, has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code.The added capability not only allows the detection of vulnerabilities within Scala code, but also the ability to...


NeuVector-has-a-new-approach-to-securing-Docker-containers

NeuVector has a new approach to securing Docker containers


Wednesday, February 1, 2017 by

NeuVector has announced the launch and availability of a new approach to securing Docker containers. With constant behavioral learning automatically applied to security policies for containers, the platform secures containers where they have been most vulnerable: in production environments where they are constantly being deployed, updated, moved, and scaled across hosts...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Enterprise-BYOD-post-holiday-woes

Enterprise BYOD post holiday woes


Tuesday, January 24, 2017 by

Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...


Ransomware-facts-and-the-steps-to-prevent-it-on-your-device

Ransomware facts and the steps to prevent it on your device


Friday, December 30, 2016 by

As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in AsiaPacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


How-to-secure-your-online-accounts-from-cyber-attacks-in-2017

How to secure your online accounts from cyber attacks in 2017


Wednesday, December 21, 2016 by

In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...


Why-you-should-ditch-traditional-business-software-analysis

Why you should ditch traditional business software analysis


Tuesday, December 20, 2016 by

Competition between software companies is a fierce battle waged not with weapons, but with scalable, intuitive, and efficient solutions that can most effect their customer’s lives. The importance of a well coordinated and strategic approach to how you choose to execute your solution is perhaps one of the most fundamental necessities required to succeed in markets.That’s...


Cyberbit

Cyberbit's SOC 3D automation updates and what you should know


Tuesday, December 20, 2016 by

Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...


Automatically-generate-network-security-intelligence-with-new-tool

Automatically generate network security intelligence with new tool


Monday, December 19, 2016 by

Logtrust, a real-time big data-in-motion firm for big data analytics, and Panda Security, a cloud-based security solution, announced the availability of the Advanced Reporting Tool (ART), which automatically generates security intelligence that allows organizations to pinpoint attacks and unusual behaviors, and detect internal misuse of systems and networks. ART's uniqu...


Tufin-extends-Check-Point-R80-security-management

Tufin extends Check Point R80 security management


Monday, December 19, 2016 by

Tufin, a network security policy orchestration solutions, has announced support for Check Point R80 Security Management, delivering end-to-end change automation and continuous policy compliance for joint customers across hybrid networks. With Tufin, Check Point users who are currently deploying or plan to deploy R80 Security Management can extend the benefits of consoli...


Intel-Security-Enhances-Unified-Defense-Architecture

Intel Security Enhances Unified Defense Architecture


Thursday, November 3, 2016 by

Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...