Security News & Reviews

More Security News

deception based technology

Attivo Networks Enhances Deception Platform With Forensic Collection

|
Deceiving attackers is one thing, but getting information from an attack that can help improve overall defences, is even better.
Qualys Patch Management

Qualys Extends Cloud Platform With Patch Management

|
Qualys is adding patch management capabilities to its Cloud Platform, providing organizations with an integrated capability to discover IT assets as well as manage and patch vulnerabilities.
Daily Tech Briefing - Feb. 12, 2019

Check-In System Flaw Puts Major Airlines at Risk VIDEO

|
DAILY VIDEO: Major airlines at risk from check-in system flaw, Wandera reports, and Dell EMC eyes the edge for open networking.
container

Researchers Warn of Malicious Container Escape Vulnerability

|
A new vulnerability in the core runc container code could potentially enable a malicious container to get access to the host operating system. Major vendors and cloud providers are already pushing out patches, but there are other things users can do to limit risk.
eWEEK logo Data Points copy

eWEEK Data Points: Five Trends Impacting the Future of DevOps

|
eWEEK DATA POINTS: DevOps has been a popular and successful approach to handling new-gen app development. In this article, CEO Fernando Areias of Liferay Cloud discusses the five trends he sees reshaping the world of DevOps.
Twistlock Istio

How To Secure Istio Service Mesh Deployments

|
The open-source Istio service mesh technology provides many security options, though a number of critical controls are not turned on by default.
CPX 360

Check Point Refining Its Security Offerings to Meet Evolving Demands

|
At its latest tech conference in Las Vegas, Check Point Software shares where the long-time security company is heading.
Blue Hexagon

Blue Hexagon Uses the Power of Deep Learning to Detect Network Threats

|
Blue Hexagon emerges from stealth with a cyber-security platform that makes use of deep learning techniques to infer when potential malware is active on a network.
Apple Logo

Apple Patches FaceTime Vulnerability in iOS, macOS Updates

|
Apple iOS and macOS users are strongly advised to update their devices as soon as possible with patches in the iOS 12.1.4 and the macOS Mojave 10.14.3 supplement updates, as Google warns of new zero-day vulnerabilities.
Daily Tech Briefing Feb. 8, 2019

Improper Practices Around Passwords the Focus of New Google Study VIDEO

|
DAILY VIDEO: Password reuse remains a barrier to safer internet use, and Google is set to advance confidential computing with its Asylo project.
SecuritySurveyLogocp

eSecurityPlanet Research Shows Gaps in Security Spending, Hiring

|
IT SECURITY ANALYSIS: Highly publicized data breaches, increasing vulnerabilities and new privacy regulations globally are pushing companies to increase spending on trusted IT security tools, staff, and hiring. But about a third of enterprises are falling behind in upgrading their systems.
Idaptive

Idaptive Looks to Reduce Identity and Access Management Friction

|
Months after becoming a separate stand-alone business from Centrify, Idaptive is now launching its unified approach to helping organizations manage identity and access.
Netography

Netography Emerges With Autonomous Flow-Based DDoS Defense Service

|
The network security startup emerges from stealth with a service that looks to provide more network packet level visibility to organizations, to detect and then block potential DDoS attacks.

Enterprise Tech Videos