security intelligence

security intelligence news search results

Developer news items we found relating to security intelligence

23 results
PKI-Spotlight-security-solution-launches

PKI Spotlight security solution launches


Wednesday, April 6, 2022 by

PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...


Splunk-expands-machine-learning-capabilities

Splunk expands machine learning capabilities


Monday, October 2, 2017 by

Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...


Dataguise-released-DgSecure-for-Google-Cloud-Storage

Dataguise released DgSecure for Google Cloud Storage


Tuesday, March 14, 2017 by

Dataguise has said that DgSecure Detect now supports sensitive data discovery on Google Cloud Storage (GCS). Integration with GCS extends the range of platforms supported by DgSecure and helps data-driven enterprises move to the cloud with confidence by providing precise sensitive data discovery across the enterprise and in the cloud. With their platform, organizations ...


App-customer-loyalty:-3-things-to-look-for-in-a-loyalty-API

App customer loyalty: 3 things to look for in a loyalty API


Tuesday, February 14, 2017 by

For the modern consumer, rewards are an essential part of their shopping experience; just last year the number of loyalty program memberships in the United States topped three billion - a 26 percent increase from 2013. With a growing demand for loyalty programs, there is no better time for developers to incorporate loyalty into their products, apps, point of sale softwa...


IBM-Watson-for-cyber-security-has-cognitive-skills

IBM Watson for cyber security has cognitive skills


Monday, February 13, 2017 by

According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...


Introducing-a-web-security-ACL-to-block-based-on-device-fingerprints

Introducing a web security ACL to block based on device fingerprints


Friday, February 3, 2017 by

Distil Networks, Inc., a bot detection and mitigation company, has announced a web application security Access Control List (ACL) platformA to block based on device fingerprints, providing a more effective way for website defenders to manage and apply whitelists and blacklists across their online applications."A key piece of feedback we got from our Bot Defense Council ...


New-release-of-Aqua-security-platform-includes-secrets-management

New release of Aqua security platform includes secrets management


Friday, February 3, 2017 by

Aqua Security, a platform provider for securing containerized applications, has announced the release of version 2.0 of its Container Security Platform (CSP). A major requirement for securing containerized applications is ensuring that containers can only communicate within their permitted network segment, limiting the “blast radius” in case of an attack. The challenge ...


Optimizing-your-app-server-performance-really-matters

Optimizing your app server performance really matters


Friday, February 3, 2017 by

As people are becoming more and more likely to turn to software as a means for entertainment, computer utility solutions, and everything in between, the load on a healthy business's servers can quickly max out. This can cause some major issues, i.e. leaving your customers suffering from horrible load times or even completely dead in the water. That's why a intuitiv...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


Checkmarx-opens-beta-support-for-Scala-programming-language

Checkmarx opens beta support for Scala programming language


Wednesday, February 1, 2017 by

Checkmarx, an application security testing company, has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code.The added capability not only allows the detection of vulnerabilities within Scala code, but also the ability to...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Ransomware-facts-and-the-steps-to-prevent-it-on-your-device

Ransomware facts and the steps to prevent it on your device


Friday, December 30, 2016 by

As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in AsiaPacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


How-to-secure-your-online-accounts-from-cyber-attacks-in-2017

How to secure your online accounts from cyber attacks in 2017


Wednesday, December 21, 2016 by

In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...


Why-you-should-ditch-traditional-business-software-analysis

Why you should ditch traditional business software analysis


Tuesday, December 20, 2016 by

Competition between software companies is a fierce battle waged not with weapons, but with scalable, intuitive, and efficient solutions that can most effect their customer’s lives. The importance of a well coordinated and strategic approach to how you choose to execute your solution is perhaps one of the most fundamental necessities required to succeed in markets.That’s...


Cyberbit

Cyberbit's SOC 3D automation updates and what you should know


Tuesday, December 20, 2016 by

Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...


Automatically-generate-network-security-intelligence-with-new-tool

Automatically generate network security intelligence with new tool


Monday, December 19, 2016 by

Logtrust, a real-time big data-in-motion firm for big data analytics, and Panda Security, a cloud-based security solution, announced the availability of the Advanced Reporting Tool (ART), which automatically generates security intelligence that allows organizations to pinpoint attacks and unusual behaviors, and detect internal misuse of systems and networks. ART's uniqu...


What

What's so tricky about Android security anyway


Monday, December 12, 2016 by

Android authentication can be a tricky business because it can help identify the user, but it can also open the door to hackers at the same time. It all comes down to the device administrator access which comes with a lot of benefits like. Device administrator access provides complete device management access rights that include creating and managing poli...


Intel-Security-Enhances-Unified-Defense-Architecture

Intel Security Enhances Unified Defense Architecture


Thursday, November 3, 2016 by

Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...


IBM-Security-Channels-Its-Inner-XMen-with-Launch-of-IBM-XForce-Red-Security-Division

IBM Security Channels Its Inner XMen with Launch of IBM XForce Red Security Division


Friday, August 5, 2016 by

Someone in charge of naming divisions at IBM must have been a big Sci-Fi fan as is evidenced with IBM Security’s name for the a news security task force - IBM X-Force Red. Yep, that’s the name for a new group of IBM security professionals and ethical hackers whose goal is to help businesses discover vulnerabilities in their computer networks, hardware, and software...


Exabeam-Releases-Security-Intelligence-Platform-for-Early-Detection-of-Ransomware

Exabeam Releases Security Intelligence Platform for Early Detection of Ransomware


Thursday, June 16, 2016 by

Exabeam has released Exabeam Analytics for Ransomware, a new behavior-based security intelligence platform designed for early detection of ransomware across a corporate network. Exabeam can detect ransomware movement and activity in the network, the servers, workstations, BYOD devices, and cloud services.Exabeam detects ransomware as it first enters the network and begi...


Metalogix-ControlPoint-7.0-Offers-Security-Monitoring-for-Suspicious-SharePoint-Activity

Metalogix ControlPoint 7.0 Offers Security Monitoring for Suspicious SharePoint Activity


Thursday, November 5, 2015 by

Metalogix has released ControlPoint 7.0, offering new, embedded security intelligence, and real-time situational awareness into suspicious SharePoint user activity to help prevent data breaches and leakages. With the combination of Metalogix Sensitive Content Manager and ControlPoint 7.0, the platform offers unified management to optimize the availability, performance, ...


AlienVault-Releases-Native-Solution-for-AWS-Cloud-Security-and-Threat-Intelligence

AlienVault Releases Native Solution for AWS Cloud Security and Threat Intelligence


Saturday, April 11, 2015 by

AlienVault has announced the general availability of AlienVault Unified Security Management (USM) for Amazon Web Services (AWS). AlienVault USM for AWS is an AWS-native solution that delivers built-in security controls and threat intelligence for IT and security teams to accelerate and simplify threat detection and incident response. USM for AWS is available on AWS Mark...