Search results for: software

Melanie Kyle Gingrich joins CMMC Accreditation Body as VP for training and development

The CMMC Accreditation Body (CMMC-AB) announced the selection of Melanie Kyle Gingrich as the CMMC-AB’s first vice president for training and development. In this role, Ms. Gingrich will oversee the day-to-day development and management of the CMMC-AB training, education, and curricula management programs to support and ensure the successful growth of the CMMC ecosystem. Ms. Gingrich takes over for Mr. Ben Tchoubineh, who previously filled this important role as a member of the Board where … More

ChaosSearch expands its Data Lake Platform to deliver data insights at scale

ChaosSearch has expanded its log analytics Data Lake Platform to deliver multi-model and multi-cloud data lake for cost effective analytics and business intelligence at scale. By adding support for SQL and leveraging the platform’s unique approach for indexing data and publishing open APIs, ChaosSearch makes it easy and extremely cost-effective to quickly derive value from exploding data volumes residing in businesses’ own cloud environments. Today, businesses that seek to be data-driven are challenged by the … More

New Relic promotes Bill Staples to CEO

New Relic announced the promotion of Bill Staples to CEO effective July 1, 2021. Staples will succeed Founder & CEO Lew Cirne who will transition to Executive Chairman of the Board at the same time. Cirne will continue his lifelong legacy and passion for his love of software as an inventor, technologist and strategist, further driving transformational innovation for the company, its customers and the tech community at large. Current Chair of the Board Hope … More

hand

When exploit code precedes a patch, attackers gain a massive head start

Cybersecurity researchers that publicize exploit code used in cyberattacks are giving a clear and unequivocal advantage to attackers, new research conducted by Kenna Security and Cyentia Institute has found. “This data-driven research, built over the course of several years, should remove any doubt,” said Ed Bellis, CTO of Kenna Security. “Practices that have long been central to the cybersecurity ecosystem, that many of us thought were beneficial, are in fact harmful to defenders.” Exploit code … More

RemotePC adds new features for Linux remote access

RemotePC has updated their remote access for Linux offering with new features: Linux Remote Sound – enables users to listen to audio files from the remote machine on their local device Linux Headless Server Remote Access Support – users can access a Linux server without any monitor connected to it Raspberry Pi as host – users can access Raspberry Pi devices with the RemotePC application After the RemotePC remote access application is downloaded on a … More

Benu Networks’ SASE solution now supports the Telecom Infra Project’s OpenWiFi Controller

Benu Networks announced that its Secure Access Service Edge (SASE) solution now supports the Telecom Infra Project’s OpenWiFi Controller with the ability to manage OpenWiFi compliant third party Wi-Fi access points (APs). Benu Networks’ Remote Workforce and Enterprise SASE solutions make it easier than ever to secure network traffic, dynamically launch services, and manage the TIP OpenWiFi family of Access Points (APs). The OpenWiFi platform reimagines the way Enterprise grade Wi-Fi networks are built and … More

AppCrown partners with ShellBlack to deliver CRM experiences for financial services customers

AppCrown announced ShellBlack as an industry consulting partner for bringing AppCrown’s managed integration network into enterprise CRMs such as Salesforce Financial Services Cloud (“FSC”). Today, financial services firms seeking help to integrate custodians, clearing, financial planning software, portfolio management systems, and other 3rd party industry systems can use AppCrown’s managed integration network to immediately integrate critical industry systems. AppCrown’s integration network, which includes industry systems such as Pershing, Schwab, eMoney, and MoneyGuide Pro, will integrate … More

IP Infusion and Edgecore Networks’ disaggregated networking solution now deployed at LINX

IP Infusion and Edgecore Networks jointly announced that the full network migration of its disaggregated networking solution at the London Internet Exchange (LINX) Manchester interconnection point has been completed. Connecting over 980 networks in over 80 countries, LINX is one of the largest operators of Internet Exchange Point (IXP) services and was the first IXP in the world to adopt a disaggregated model at a large scale. LINX Manchester has more than 120 connected networks … More

Raghu Raghuram becomes CEO of VMware

VMware announced that its Board of Directors has appointed Rangarajan (Raghu) Raghuram as Chief Executive Officer and member of the Board of Directors, effective June 1, 2021. An industry veteran, Raghuram is a strategic business leader who currently holds the position of Executive Vice President and Chief Operating Officer, Products and Cloud Services at VMware. “I am thrilled to have Raghu step into the role of CEO at VMware. Throughout his career, he has led … More

NetSPI raises $90M to fuel innovation, growth, global expansion and product innovation

NetSPI announced it has raised $90 million in growth funding led by KKR, with participation from Ten Eleven Ventures. The investment will be used to further accelerate NetSPI’s rapid growth by expanding the company’s cyber security and client experience teams, investing in product innovation, and deepening operations across U.S. and international markets. “The reality is that cyber security attacks today are inevitable and put organizations at grave risk,” said NetSPI President and Chief Executive Officer … More

Sophos XDR

Sophos XDR: Threat hunting through the entire security ecosystem

Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading unlicensed software or child pornography. Not long after that cyber criminals switched to ransomware that actually encrypted users’ files, and then pretty quickly realized that companies make for much more profitable victims than consumers. As tech providers and security companies found ways to prevent the malware from being delivered via email, … More

containers

3 areas of implicitly trusted infrastructure that can lead to supply chain compromises

The SolarWinds compromise in December 2020 and the ensuing investigation into their build services put a spotlight on supply chain attacks. This has generated a renewed interest by organizations to reevaluate their supply chain security posture, lest they become the next SolarWinds. But SolarWinds is just one of many recent supply chain attacks. To get a broader understanding of what organizations are up against, let’s look at three major supply chain compromises that occurred during … More