Network Security News

Woman in grey working from home

By Elad Shapira, Head of Research at Panorays In the wake of coronavirus, companies are shifting their workforce to remote locations to keep businesses underway. This is an attempt to keep workers healthy and semi-quarantined to protect against the spread of a world pandemic that is not only a threat to health, but also to the world’s economies. The list of global organizations mandating work-from-home policies includes Microsoft, Apple, Google and Amazon, and that list...

Read more
Face Mask

By Rita Selvaggi, CEO of ActivTrak The global reach of the coronavirus has elevated the discussion around the need for “social distancing” and working remotely to avoid spreading the infectious virus. Global companies like IBM, Goldman Sachs, and PwC are asking employees to work from home, as are smaller organisations, such as Seattle-based online payment company Stripe. As organisations consider having employees work from home on a more massive scale, it’s important to recognise that...

Read more
something shiney and spacial

As we all know, the world of cybersecurity is an ever-evolving, fast-growing industry that can be tough to follow at times. For example, we have seen a rapid upsurge in the use of smart devices and with that, an increased risk of cyberattacks. This has not been limited to private households either. Rather, the logistics industry and private vehicles are also at risk of being hacked. Indeed, as individuals and industries increasingly move online, this...

Read more
Vulnerabiltiy Management button

Greenbone, a leading provider of vulnerability analysis for IT networks, today announced that its proven portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone’s customers can now choose to deploy physical or virtual appliances, increasing flexibility and efficiency, while ensuring that data protection is always guaranteed. VM solutions identify and patch security-relevant vulnerabilities in IT systems, helping businesses reduce their exposure to risks and improving the overall resilience of their infrastructures....

Read more
Computer Graphs

SAM Seamless Network, the intuitive security system for smart networks, today announced the launch of its Threat Assessment Lab to uncover new attack vectors focusing on IoTs and embedded devices. Amongst its latest research findings, smart home security cameras equate to 47% of the most vulnerable devices followed by smart hubs such as Google Home, Amazon Alexa, with the top countries executing attacks coming from China followed by USA. Other findings reveal the USA and...

Read more
Blox One Threat Defence

Infoblox Inc., the leader in Secure Cloud-Managed Network Services, today announced BloxOne™ Threat Defense, the industry’s first hybrid security offering that leverages DNS as the first line of defence to detect and block today’s sophisticated cyber threats. With a scalable hybrid architecture, BloxOne Threat Defense secures enterprises’ existing networks as well as digital transformations like cloud, IoT and SD-WAN deployments. It makes an organisation’s threat analysts more productive and reduces the total cost of enterprise...

Read more
Tufin

Tufin® (NYSE: TUFN), a company pioneering a policy-centric approach to security and IT operations, today announced the release of Tufin Orchestration Suite R19-1, advancing its leadership in network security automation with the industry’s first solution to feature policy-based automation for server policy cloning. Enterprises today devote significant time and resources to processing access requests related to server policy cloning during application migration. With its new server policy cloning capabilities, the latest version of the award-winning...

Read more
Targeted by cybercriminals

Almost one-quarter of brands have had their domain targeted by cyber criminals. This is according to the latest global research report released by MarkMonitor, a world leader in enterprise brand protection. The report also highlighted that 62% of brands reported that cybercrime impacted their business in the last year. Almost half of the sample believes brand infringement has increased over the last year, while 46% said that cyber threats influenced the development of their domain...

Read more
Cloud Security motherboard

New threat intelligence from F5 Labs has highlighted the increasing vulnerability of a programming language used in over 80% of the world’s websites. According to F5 Labs’ data partner Loryka, 81% of malicious traffic monitored in the wild in 2018 was PHP-related. This represents a 23% rise compared to 2017. Monitoring focused on initial reconnaissance campaigns looking for admin surfaces to compromise as part of a broader attack chain. Featuring in the first instalment F5...

Read more
Trend Micro logo

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, has announced enhancements to its Deep Security™ and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes Engine (GKE) and Gmail on the G Suite. Trend Micro Executive Vice President, Network Defense and Hybrid Cloud Security, Steve Quane said, “An increasing number of businesses...

Read more
Page 1 of 3 1 2 3