Search results for: isolation

building

Security starts with architecture

The battle against hackers and threats is an arms race against highly motivated opponents, and with the number of attacks and threats continually growing, it’s impossible to achieve security by simply patching up a broken architecture with single, niche tools. The way security groups are typically structured to defend against and respond to threats is similarly flawed. There is an invariable disconnect between where and how security policies are framed, security is enforced, and security … More

Cyberinc Isla Isolation Platform 6 adapts the browsing experience with dynamic risk assessment

Cyberinc announced the release of the Isla Isolation Platform 6, featuring significant enhancements that improve the user experience and strengthen security against the most prominent web, email, and document-based threats. With the introduction of Isla Smart Isolation, an industry-first capability, Cyberinc advances browser isolation technology to simplify deployments and improve the user experience through context-aware isolation. Smart Isolation adapts the browsing experience with dynamic risk assessment, powered by the Cyberinc Threat Intelligence Service, to remotely … More

Zadara acquires NeoKarm enabling MSPs to offer an on-demand private cloud

Zadara announced the acquisition of NeoKarm. With this acquisition, Zadara obtains NeoKarm technology including the former Stratoscale software IP, which enables MSPs to offer an on-demand private cloud built and fully-managed by Zadara. Additionally, Simon Grinberg, CEO for NeoKarm and former head of product for Stratoscale, has joined Zadara as the head of product. Key NeoKarm DevOps and engineering personnel will also be added to the Zadara roster to continue the development of the technology … More

Palo Alto Networks Prisma Access 2.0 securely enables work-from-anywhere

Palo Alto Networks announced the release of Prisma Access 2.0 to securely enable work-from-anywhere with the industry’s most complete cloud-delivered security platform. As work continues to change and needs to be done securely everywhere, with no compromise on speed, security or performance, Prisma Access 2.0 introduces critical enhancements, including self-healing infrastructure for optimal experience, ML-powered security to help prevent attacks in real time, cloud SWG capabilities for a secure web gateway regardless of user location, … More

remote work

Enable secure remote workspaces without trashing your entire IT infrastructure

Roughly 12 months ago, when the world shifted seemingly overnight to work-from-home, few companies were well-positioned to seamlessly scale their remote work solutions. Legacy remote desktop solutions, like Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) were pressed into wider service than they had been custom fit to provide. Security policies governing remote working and secure access were either scaled up or slapped together in an ad hoc fashion to keep operations going, but they often … More

Belkin unveils Secure KVMs portfolio designed for NIAP protection Profile 4.0 compliance

Belkin announces an entirely new portfolio of Secure KVMs designed for National Information Assurance Partnership (NIAP) Protection Profile 4.0 compliance. Belkin’s portfolio consists of the Universal 2nd Generation Secure KVMs as well as the Modular Series of Secure KVMs. Combined, the two platforms give government agencies an unprecedented level of flexibility in designing their environments and equipping employees with the exact value and functionality needed for the mission. Secure KVMs maintain air-gap network isolation while … More

identity theft

Can we put a stop to cyber harassment?

Cyber harassment via social networks, media, and other online channels is an everyday reality for too many people, and the problem is getting worse. It might seem inevitable, as people are spending more and more time online, but Matthieu Boutard, Managing Director at Bodyguard, a French technology start-up that protects users against cyber-bullying, hate speech and toxic content online, believes that to understand what is fueling the rise of cyber harassment, we should look at … More

PC

93% of workers overshare online, causing security risks

Tessian reveals just how much, and how often, people divulge about their lives online and how attackers take advantage of it. With insights from both professionals and hackers, the report explores how cybercriminals use an abundant and seemingly cheap resource — the personal information people share on social media and in out-of-office alerts — to craft social engineering attacks. Workers overshare online: Social media overload 84% of people post on social media every week, with … More

MariaDB SkySQL earns ISO/IEC 27001:2013 certification

MariaDB announced that MariaDB SkySQL’s comprehensive security capabilities have earned ISO/IEC 27001:2013 certification. The ISO certification adds to MariaDB’s extensive security measures built and established to safeguard customer data at every level. “Given the confluence of increasing business migration to the cloud and the prevalence of sophisticated and highly damaging security breaches, protecting customers was a top priority for us when designing MariaDB SkySQL, and will always remain so,” said Sameer Tiwari, CTO Infrastructure for … More

week in review

Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing

Here’s an overview of some of last week’s most interesting news and articles: “Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in the GNU Privacy Guard (GnuPG) free encryption software, has a “severe” security vulnerability and should not be used, warned Werner Koch. Apple fixes three actively exploited iOS zero-days Apple has release a new batch of security updates and has fixed three iOS zero-days … More

application

Isolation-based security technologies are gaining prominence

Cyberinc shared its insights into the key trends that will shape the cybersecurity industry in the coming year. With evolving tactics that increase the risk and impact of ransomware and phishing, combined with the new normal of remote workforces, Cyberinc CEO Samir Shah believes that remote browser isolation (RBI) will prove its value as a critical must-have enterprise technology in 2021. “As mass-scale ransomware and other malware attacks continue to make headlines, companies and IT … More

trend

SCM market to reach $2.2B in total web and email security revenues by 2024

The Secure Content Management (SCM) market is expected to achieve an 11.4% compound annual growth rate to reach $2.2 billion in total web and email security revenues by 2024, according to Frost & Sullivan. Cloud-based deployments are projected to lead growth as more enterprises move their emails to the cloud and rely on the internet, including remote working, especially during COVID-19. Malicious email and web links remain the most popular attack vectors Malicious email and … More