Eskenzi PR ad banner Eskenzi PR ad banner

Software

Quest Software, a systems management, data protection and security software, company, has announced what it calls its latest breakthrough in data management with the launch of erwin Data Modeler by Quest 12.5. Boasting cutting-edge features that enhance data quality, governance, and stakeholder collaboration, erwin Data Modeler 12.5 drives organisations towards data democratisation, facilitating strategic efforts such as AI Large Language Model (LLM) development, data intelligence and data platform modernisation.   Driving Innovation Organisations that maintain...

Read more
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks recently announced that it was named as a “Leader” and “Outperformer” by GigaOm in the analyst firm’s Radar Report for Secure Service Access (SSA), GigaOm’s term for SASE/SSE. The report’s comprehensive review evaluates the degree to which suppliers converge security and networking into a single, global platform. Cato is only SASE provider to be ranked an SSA “Leader” and an “Outperformer” with perfect delivery of SD-WAN as well as the core network-based security...

Read more
The IT Security Guru Buyer’s Guide 2022

Cybersecurity and compliance are now essential pillars within the modern enterprise. They are integral to the business continuity and legal responsibility of every organization, large or small.  What’s more, these obligations are exponentially more complex than they were just 5 years ago. However, since these are relatively new obligations that means finding the best vendors and understanding the right services for your company can be uncharted territory for your team. With this in mind, the...

Read more
Open Source Risks Are Still A Challenge, But Organisations Are More Aware.

Synopsys, Inc. has announced the expansion of the Technology Alliance Partner (TAP) segment of the Software Integrity Group’s new Global Partner Program at RSA Conference. Synopsys is showcasing integrations between the company’s Intelligent Orchestration solution and technology partner tools, including CloudBees and GitHub Actions. With more than 40 DevOps ecosystem vendors currently engaged, the TAP program simplifies and accelerates partner integration with Intelligent Orchestration and other Synopsys application security solutions. Recognised as a leader by...

Read more

Synopsys has today announced it will showcase the Software Integrity Group’s new Intelligent Orchestration solution at RSA Conference on May 17th - 20th. Intelligent Orchestration is a dedicated application security automation pipeline, optimized for speed and efficiency, that ensures the right security tests are performed at the right time. Intelligent Orchestration, which runs in parallel to build and release pipelines, utilizes innovative technology to automatically determine and initiate the most appropriate security tests, including static (SAST),...

Read more
vulnerability

An information leakage can result in grave consequences. Consider the recent SolarWinds supply chain attack which transpired from the exposure of a critical, and inanely simple, internal password (solarwinds123). In this way, making the recent findings by the Synopsys Cybersecurity Research Center (CyRC) especially troubling. The analysis of over 3,000 popular Android mobile apps showed information leakage to be commonplace. Passwords, user credentials, email addresses and tokens are among the information found. With this information,...

Read more
Latest Version Of Synopsys’ BSIMM10 Study Highlights The Impact Of DevOps On Software Security.

As a result of a demanding market, developers have often foregone security for speed with security teams typically tagged on at the very end of the development lifecycle. This, however, is an unsustainable, if not unacceptable stance, in today’s environment. The future requires organisations to integrate security from the beginning when the application is built. They need to be able to adapt efficiently to protect new architectures as well as consistently improve on performance. Those...

Read more
Working from home laptop face mask

Digital collaboration tools have been around for years, however for a lot of businesses they have fallen under the radar until now. Since the outbreak of COVID-19, many organisations have been forced to ask their employees to work from home. This has made these tools a necessity for businesses whose activities rely on collaboration between employees. Finding the right collaborative solutions for your company depends on the unique structure and needs of your organisation. Here...

Read more

Today, Cybereason announced that it will extend its award-winning endpoint protection to include mobile devices with its new platforms Cybereason Mobile and Cybereason Mobile MDR. Cybereason Mobile aims to prevent, detect and respond to security issues, shielding customers from emerging mobile threats. With Cybereason’s second new offering, Cybereason Mobile MDR provides a managed service which gives enterprises access to a team of security analysts to counter advanced mobile threats across Android and iOs devices, day...

Read more
Avast Discovers Security Flaws In Widespread GPS Trackers Exposing Locations Of Over Half A Million Children And Elderly.

Avast , a global leader in digital security products, has discovered serious security vulnerabilities in the T8 Mini GPS tracker and nearly 30 other models by the same manufacturer, Shenzhen i365 Tech. Marketed to keep kids, seniors, pets, and even possessions safe, instead these devices expose all data sent to the cloud, including exact real-time GPS coordinates. Further, design flaws can enable unwanted third-parties to spoof the location or access the microphone for eavesdropping. Researchers...

Read more
Page 1 of 3 1 2 3