network security

network security news search results

Developer news items we found relating to network security

35 results
SIIA-CODiE-Awards-2020-nominations-are-now-open

SIIA CODiE Awards 2020 nominations are now open


Thursday, November 7, 2019 by

SIIA announced the nomination period for the 35th annual SIIA CODiE Awards. Applications, products and services and other related technologies for use by publishers, information service providers and consumers across the business technology industry are invited to apply between November 4 and January 17. New categories in 2020 Each year SIIA stakeholders, inc...


Finding-website-risk-levels-and-reputations-gets-easier-for-IT-admins

Finding website risk levels and reputations gets easier for IT admins


Monday, May 13, 2019 by

NetMotion Software announced NetMotion Reputation, a subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains. Reputation allows IT teams to get visibility into user behavior, including a better understanding of access to risky or inappropriate cloud applications and websites. Customers can also block access if an...


Mesh-networking-security-from-NeuVector-at-IBM-Think-2019

Mesh networking security from NeuVector at IBM Think 2019


Thursday, February 14, 2019 by

NeuVector announced a new platform integration with the Istio and Linkerd2 service meshes that expands NeuVector’s security capabilities for production Kubernetes deployments. The integration - developed in coordination with IBM Cloud and the Istio open source development team - delivers new capabilities for network visibility and threat detection, even for connec...


National-Coding-Week-is-here

National Coding Week is here


Monday, September 17, 2018 by

National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses. “Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...


Acumos-AI-Challenge-sponsors-to-give-out-$100k-in-prizes

Acumos AI Challenge sponsors to give out $100k in prizes


Thursday, July 26, 2018 by

AT&T and Tech Mahindra have announced that they will be sponsoring the Acumos AI Challenge, an open source developer competition that seeks innovative artificial intelligence (AI) solutions. Working with The Linux Foundation, the companies encourage students, developers and data scientists to submit their ground-breaking AI solutions for the chance to win prize m...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


CEO-Roundtable-participants-announced-for-Telecom-Exchange-NYC-2018

CEO Roundtable participants announced for Telecom Exchange NYC 2018


Wednesday, May 9, 2018 by

Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...


TapSafe-warranty-app-launches-at-CES

TapSafe warranty app launches at CES


Monday, January 15, 2018 by

TapSafe, a new warranty app and platform, will help consumers find, identify and protect all of their connected devices. The new product, developed by AmTrust Innovation, the products and services innovation arm of AmTrust Financial, allows users to buy warranty protection and technical support for any connected devices. Nearly three-quarters (74%) of US households have...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


Cisco-releases-security-connector-app-for-iOS-devices

Cisco releases security connector app for iOS devices


Tuesday, January 2, 2018 by

Cisco announced the availability of Cisco Security Connector, a security app designed to give enterprises the deepest visibility and control over network activity on iOS devices, now in the App Store.Apple has designed iOS to be secure from the ground up and to be simple, intuitive, and powerful for users. By using iPhones and iPads with iOS 11 and Cisco Security Connec...


Tips-for-securing-container-deployments

Tips for securing container deployments


Friday, September 1, 2017 by

Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...


The-evolving-role-of-the-Network-Engineer

The evolving role of the Network Engineer


Monday, July 31, 2017 by

Many network engineers still struggle to manage key IT workflows manually, including network troubleshooting, documentation, change management, and cybersecurity. Managing these workflows is becoming increasingly difficult, and the issue is only expected to escalate as networks grow and become more complex with the move towards software-defined networking (SDN) and clou...


Route-the-Internet-faster-with-Argo-from-Cloudflare

Route the Internet faster with Argo from Cloudflare


Monday, May 22, 2017 by

Cloudflare has announced Argo, a service that intelligently routes traffic across the Internet for a faster, more reliable, and more secure online experience.The Internet is inherently unreliable. Its massive collection of networks from different providers experiences delays and outages all the time. Internet users experience these problems as slowness reaching websites...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


Checkmarx-opens-beta-support-for-Scala-programming-language

Checkmarx opens beta support for Scala programming language


Wednesday, February 1, 2017 by

Checkmarx, an application security testing company, has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code.The added capability not only allows the detection of vulnerabilities within Scala code, but also the ability to...


NeuVector-has-a-new-approach-to-securing-Docker-containers

NeuVector has a new approach to securing Docker containers


Wednesday, February 1, 2017 by

NeuVector has announced the launch and availability of a new approach to securing Docker containers. With constant behavioral learning automatically applied to security policies for containers, the platform secures containers where they have been most vulnerable: in production environments where they are constantly being deployed, updated, moved, and scaled across hosts...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Enterprise-BYOD-post-holiday-woes

Enterprise BYOD post holiday woes


Tuesday, January 24, 2017 by

Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...


Ransomware-facts-and-the-steps-to-prevent-it-on-your-device

Ransomware facts and the steps to prevent it on your device


Friday, December 30, 2016 by

As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in AsiaPacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


How-to-secure-your-online-accounts-from-cyber-attacks-in-2017

How to secure your online accounts from cyber attacks in 2017


Wednesday, December 21, 2016 by

In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...


Why-you-should-ditch-traditional-business-software-analysis

Why you should ditch traditional business software analysis


Tuesday, December 20, 2016 by

Competition between software companies is a fierce battle waged not with weapons, but with scalable, intuitive, and efficient solutions that can most effect their customer’s lives. The importance of a well coordinated and strategic approach to how you choose to execute your solution is perhaps one of the most fundamental necessities required to succeed in markets.That’s...


Cyberbit

Cyberbit's SOC 3D automation updates and what you should know


Tuesday, December 20, 2016 by

Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...


Automatically-generate-network-security-intelligence-with-new-tool

Automatically generate network security intelligence with new tool


Monday, December 19, 2016 by

Logtrust, a real-time big data-in-motion firm for big data analytics, and Panda Security, a cloud-based security solution, announced the availability of the Advanced Reporting Tool (ART), which automatically generates security intelligence that allows organizations to pinpoint attacks and unusual behaviors, and detect internal misuse of systems and networks. ART's uniqu...


Tufin-extends-Check-Point-R80-security-management

Tufin extends Check Point R80 security management


Monday, December 19, 2016 by

Tufin, a network security policy orchestration solutions, has announced support for Check Point R80 Security Management, delivering end-to-end change automation and continuous policy compliance for joint customers across hybrid networks. With Tufin, Check Point users who are currently deploying or plan to deploy R80 Security Management can extend the benefits of consoli...


Intel-Security-Enhances-Unified-Defense-Architecture

Intel Security Enhances Unified Defense Architecture


Thursday, November 3, 2016 by

Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...


You-can-now-build-and-run-apps-in-FileMaker-Cloud

You can now build and run apps in FileMaker Cloud


Monday, October 3, 2016 by

FileMaker, Inc. has released its cloud-based platform for managing and running custom apps, FileMaker Cloud. The offering provides the simplicity, performance and reliability of the FileMaker Platform without having to spend time and resources deploying and maintaining a server.FileMaker enables businesses, both small and large, to quickly and easily deploy custom mobil...


AWS-Wants-You-to-Train-and-Certify-on-Cloud-Computing-Security

AWS Wants You to Train and Certify on Cloud Computing Security


Saturday, July 9, 2016 by

As part of its Training & Certification program, AWS has updated its self-paced Security Fundamentals course that provides an introduction to fundamental cloud computing and AWS security concepts, including AWS access control and management, governance, logging, and encryption methods. The web based course also addresses security-related compliance protocols, risk m...


Testing-is-Like-the-Rodney-Dangerfield-of-DevOps--It-Gets-No-Respect

Testing is Like the Rodney Dangerfield of DevOps It Gets No Respect


Tuesday, June 14, 2016 by

When Joan Wrabetz, CTO of QualiSystems, reached out to discuss why “Test is like the Rodney Dangerfield of DevOps – it gets no respect”, I thought, “Ok, I’ll listen to that.” So here you go:ADM: So, you mentioned to me that “Test is like the Rodney Dangerfield of DevOps – it gets no respect”, but you also mention that in a recent Gartner survey, over 50% of respondents ...


Level-3-Communications-Releases-New-SaaS-Network-Security-Solution

Level 3 Communications Releases New SaaS Network Security Solution


Monday, May 30, 2016 by

Level 3 Communications has the launched the Enterprise Security Gateway (ESG) platform, a new cloud-based SaaS network security solution. The platform uses Level 3's network to provide carrier agnostic, network-based security protection.ESG utilizes Level 3's global IP backbone capacity, more than 42 Terabits per second (Tbps), and interconnection agreements to access s...


Guidelines-to-Identify-and-Protect-Against-Internal-Network-Security-Threats

Guidelines to Identify and Protect Against Internal Network Security Threats


Friday, February 19, 2016 by

APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of data breaches and internal threats, which despite receiving less public attention, can be just as dangerous and damaging as ...


One-in-Four-Android-Apps-Have-High-Risk-Security-Flaws

One in Four Android Apps Have High Risk Security Flaws


Friday, February 12, 2016 by

Mobile developers continue to battle security issues with their apps according to a new report by NowSecure. The annual report, 2016 NowSecure Mobile Security Report, provides insight into the current state of mobile security. According to the report a quarter of Android apps have at least one high risk security flaw, 35 percent of communications sent by mobile dev...


Dell-Goes-Back-to-the-Future-With-Product-Releases-at-Dell-World-2015

Dell Goes Back to the Future With Product Releases at Dell World 2015


Wednesday, October 21, 2015 by

With the announcement of the EMC purchase a brief week ago, Dell is flexing its new found muscles at its annual Dell World conference, with announcements of expansion of Dell products and the new future that the EMC acquisition represents.At its opening night ceremony, all of Dell’s products and services were on exhibit and the theme of a future centric strategy was no ...


New-Report-Highlights-Wide-Ranging-Cybersecurity-Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges


Wednesday, September 2, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...


HP-Internet-of-Things-Study-Shows-Majority-of-IoT-Devices-Contain-Serious-Vulnerabilities

HP Internet of Things Study Shows Majority of IoT Devices Contain Serious Vulnerabilities


Monday, August 4, 2014 by

HP has released new research, The Internet of Things State of the Union Study, which reveals that 70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities. The study is an outgrowth of HP’s OWASP Internet of Things Top 10 Project. The projects goal is to educate the IT community on the main facets of Internet of Things s...