Zero trust policies for software releases could be key
Thursday, December 8, 2022 by Gopinath Rebala
Today’s integrated DevOps methodology offers businesses the promise of accelerating innovation by providing customers and employees with new application capabilities faster. However, this approach can also increase risks associated with cybercrime and the failure to comply with rapidly evolving privacy regulations. As a result, minimizing security risk during the ...
Open Bug Bounty has fixed 1 million vulnerabilities
Monday, November 7, 2022 by Brittany Hainzinger
Open Bug Bounty is an open, disintermediated, cost-free, and community-driven Bug Bounty platform for coordinated, responsible, and ISO 29147 compatible vulnerability disclosure. It passed the milestone on 27 October of fixing over 1,000,000 web security vulnerabilities.
The Open Bug Bounty project enables website owners to receive advice and support from&n...
Ransomware prevention platform ProLion sees large increase in revenue
Monday, October 24, 2022 by Freeman Lightner
ProLion has recorded an 80 percent increase in revenue for FY2022, driven by the addition of over 250 new customers worldwide. The uplift has been driven by demand for its ransomware protection solution CryptoSpike, which has soared as a result of the rise in ransomware and ransomware-as-a-service attacks.
The company also reported a renewal rate of 89...
Security compliance predictions for 2022
Tuesday, January 18, 2022 by Freeman Lightner
Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions....
Increase developer productivity in 2022
Sunday, January 9, 2022 by Freeman Lightner
Patrick Jean is the CTO at OutSystems, where he's focused on building a great engineering culture where motivated people are free to unleash their passion doing meaningful work. With more than 20 years of engineering leadership experience, he has led multiple high-stakes, cloud transformation initiatives at SaaS providers, blending customer focus, inspired developme...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
Low code platform Zenity lands $5M in funding
Wednesday, December 8, 2021 by Christian Hargrave
Zenity exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by top executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher. With Zenity, businesses can promote citizen development and adopt Low-Code/No-Code platforms while avoiding critical data exfiltration or disr...
StorONE launches backup storage
Friday, November 19, 2021 by Brittany Hainzinger
The latest ransomware variants perform what is known as sleeper attacks, which avoid discovery by slowly infecting data. By the time an organization realizes it is dealing with a ransomware attack, a high percentage of data is encrypted. Modern backup storage needs to not only provide immutability of backup data it must do so, without impacting performance for pote...
Offshore software developers risks and advantages
Thursday, October 28, 2021 by Vivien F. Peaden
The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market.
Risks and advantages of using offshore software developers
The pandemic ...
Vanta launches Automated ISO 27001 Certification and HIPAA Compliance
Tuesday, July 13, 2021 by Brittany Hainzinger
Vanta announced public availability for two new certification standards that help secure the internet and protect consumer data. Vanta provides automated compliance audits and continuous security monitoring through a robust SaaS platform, enabling companies to achieve industry standardization in weeks instead of months.
The rise of data leaks and privacy concerns hav...
Cyvatar raises 9 million for cybersecurity as a service model
Monday, June 21, 2021 by Brittany Hainzinger
Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model.
Cyvatar raises 9 million for cybersecurity as a service model
Escalating cybersecurity breaches and the need to addr...
Zero trust framework no longer optional 2021 predictions
Tuesday, January 12, 2021 by Brittany Hainzinger
There’s no doubt that COVID-19 and the shift to remote work have accelerated Zero Trust adoption in the enterprise. In 2021 and the following years, implementing a Zero Trust approach will become essential to protecting every enterprise, regardless of industry. This is due to the increasing volume of cyberthreats that organizations and individuals face on a regula...
Beta support for Kubernetes announced by Druva Inc.
Wednesday, September 23, 2020 by Brittany Hainzinger
Druva, Inc. announced beta support for Kubernetes workloads which delivers complete application protection that is accessible by all teams, including the central IT team and DevOps. Offered through Druva Cloud Platform, users can quickly recover, migrate, or clone Kubernetes workloads, alongside existing data center, and cloud workloads from a unified interface. Combini...
Data Privacy Day 2020 is here
Tuesday, January 28, 2020 by Richard Harris
Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure.
Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...
Zeroday vulnerability announced byMcAfee at Defcon
Monday, August 19, 2019 by Richard Harris
At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system.
The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...
Running applications directly from Cohesity now possible
Monday, March 4, 2019 by Richard Harris
Cohesity announced new capabilities that empower enterprises to run applications from Cohesity as well as third parties directly on the Cohesity DataPlatform. This milestone is a big step forward in empowering enterprises to derive insights from their most valuable business asset, their data.
This is the first time that enterprises are able to run applications ...
Cisco releases security connector app for iOS devices
Tuesday, January 2, 2018 by Christian Hargrave
Cisco announced the availability of Cisco Security Connector, a security app designed to give enterprises the deepest visibility and control over network activity on iOS devices, now in the App Store.Apple has designed iOS to be secure from the ground up and to be simple, intuitive, and powerful for users. By using iPhones and iPads with iOS 11 and Cisco Security Connec...
Splunk expands machine learning capabilities
Monday, October 2, 2017 by Richard Harris
Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...
Stop the menace of Android rooting malware attacks with RASP
Monday, September 25, 2017 by Frederik Mennes
One of the key security issues facing organizations that support Android devices is the risk of rooting malware. A number of malware families on the Android mobile OS attempt to obtain root access once installed because the elevated privileges gained come in handy to perform malicious activities.
What you need to know about Tordow v2.0 and Pegasus
The To...
Over 90 percent of healthcare IT networks have IoT devices connected
Thursday, July 20, 2017 by Christian Hargrave
ZingBox has released the results of its survey of IT decision-makers within the healthcare industry. The survey, fielded in early July, found that the majority of healthcare IT networks have IoT devices and that most IT departments believe that existing security solutions for laptops and servers can also protect connected medical devices.More than 90% of healthcare IT n...
DevSecOps will help security and developers play nice
Thursday, June 15, 2017 by Richard Harris
Veracode, a security software company acquired by CA Technologies, has announced the results of a study examining the relationships between application developers and security teams.The study, conducted in conjunction with Enterprise Strategy Group (ESG), shows that despite the pervasive belief that security and development teams have conflicting priorities, initiatives...
Protect against Wannacry with help from this free course
Friday, May 19, 2017 by Richard Harris
Alison has released a new course to teach people about the recent WannaCry global virus threat.The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus, it maliciously gains access to computer systems, locking down and making inaccessible to you and others your private information and data, then r...
VPNs will not protect your privacy but this might
Monday, April 10, 2017 by Richard Harris
Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...
The data security money pit
Wednesday, January 25, 2017 by Richard Harris
93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...
Bitdefender releases IoT security device at CES 2017
Saturday, January 7, 2017 by Richard Harris
Bitdefender BOX helps with smart device hacking that threatens our new way of being connected with IoT.Bitdefender, a cybersecurity solutions provider, unveils at CES in Las Vegas the next-generation of Bitdefender BOX, the device turning the table on cyber-criminals and revolutionizing the way people protect themselves from malware, hackers, ransomware, phishing and ot...
Artificial Intelligence: 5 key attributes of all modern AI systems
Thursday, January 5, 2017 by Richard Harris
What are the common attributes that all modern Artificial Intelligence systems share? Former NASA Deputy Chief of AI at the Ames Research Center, Monte Zweben tells us.
A technology industry veteran, Monte Zweben's early career was spent with the NASA Ames Research Center as the Deputy Chief of the Artificial Intelligence Branch, where he won the prestigio...
Ransomware facts and the steps to prevent it on your device
Friday, December 30, 2016 by Richard Harris
As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Christian Hargrave
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
What an advanced threat approach for cloud security must address
Wednesday, December 14, 2016 by Christian Hargrave
Headlines about hacking and malware prove that traditional security methods are not up to the task of protecting organizational infrastructures and data from theft and ransomware. As more organizations embrace cloud-first platforms for everything from customer relationship management (CRM) to enterprise resource planning (ERP) platforms and beyond, they place themselves...
What's so tricky about Android security anyway
Monday, December 12, 2016 by Don Duncan
Android authentication can be a tricky business because it can help identify the user, but it can also open the door to hackers at the same time. It all comes down to the device administrator access which comes with a lot of benefits like. Device administrator access provides complete device management access rights that include creating and managing poli...
Intel Security Enhances Unified Defense Architecture
Thursday, November 3, 2016 by Richard Harris
Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...
IBM Security Channels Its Inner XMen with Launch of IBM XForce Red Security Division
Friday, August 5, 2016 by Stuart Parkerson
Someone in charge of naming divisions at IBM must have been a big Sci-Fi fan as is evidenced with IBM Security’s name for the a news security task force - IBM X-Force Red. Yep, that’s the name for a new group of IBM security professionals and ethical hackers whose goal is to help businesses discover vulnerabilities in their computer networks, hardware, and software...
Report Indicates Data Breaches Continue Across Industries in Q2 2016
Friday, July 15, 2016 by Stuart Parkerson
Edgile has released its Q2CY16 GRC (Governance, Risk and Compliance) Content report that provides regulatory updates across a range of industries and examines significant data breaches in Q2. This report information about new laws and regulations affecting them, covering PCI DSS, GLBA, HIPAA and more, to protect against cyberattacks. The report indicates that Rans...
Exabeam Releases Security Intelligence Platform for Early Detection of Ransomware
Thursday, June 16, 2016 by Richard Harris
Exabeam has released Exabeam Analytics for Ransomware, a new behavior-based security intelligence platform designed for early detection of ransomware across a corporate network. Exabeam can detect ransomware movement and activity in the network, the servers, workstations, BYOD devices, and cloud services.Exabeam detects ransomware as it first enters the network and begi...
Report Highlights How Cyber Criminals Move Their Infrastructure to Avoid Detection
Thursday, March 10, 2016 by Stuart Parkerson
Damballa just released its Q1 2016 State of Infections Report highlighting exactly how cyber criminals evade detection. The report dives deep into how cyber criminals move their infrastructure and conceal their tracks to avoid detection.The study cited an example of how the criminals behind the Pony Loader malware are able to propagate widely and remain undetected by co...