Three reasons employee monitoring software is making a comeback

Companies are increasingly implementing employee and user activity monitoring software to: Ensure data privacy Protect intellectual property and sensitive data from falling into the wrong hands Stop malicious or unintentional data exfiltration attempts Find ways to optimize processes and improve employee productivity. Modern user activity monitoring software is incredibly flexible, providing companies with the insights they need while offering the protection they demand. By examining three prominent use cases, it’s evident that employee monitoring software … More

Product showcase: Veriato Cerebral user & entity behavior analytics software

When it comes to identifying and stopping insider data security threats, actionable insights into people’s behaviors are invaluable. Employees involved in negative workplace events, contractors with access to critical systems and sensitive data, and departing employees all present elevated risks. Whether it’s a true insider exfiltrating data, or hackers leveraging compromised credentials to become an insider, behavior patterns can indicate both emerging and immediate risks to your security. Veriato Cerebral user & entity behavior analytics … More

Respond Software experiences explosive growth in adding expert capacity to cybersecurity teams

Respond Software, innovators in Robotic Decision Automation software, announced it grew customer acquisition 6Xs year-over-year in 2018. Additionally, its flagship product, the Respond Analyst, delivered the equivalent of 14 full-time security expert analysts on average to every Respond Software customer’s security team last year. The Respond Analyst’s ability to deploy quickly and increase the capacity of security teams appealed to a wide array of customers, including companies representing financial services, healthcare, construction, telecommunications, gaming, retail … More

Check Point and Ericom Software join forces to tackle browser-based attacks

Ericom Software unveiled the integration of Ericom Shield Remote Browser Isolation (RBI) solution with Check Point Software Technologies Advanced Network Threat Prevention. Combining Ericom Shield remote browsing technology with Check Point threat intelligence and edge security protection generates a defense that enables organizations to stay ahead of attackers, while maintaining user access to browser-based services and assets. As a defense against threats, Check Point leverages HTTPS inspection, sandboxing, threat extraction, application control, URL filtering and … More

Ixia launches new software for management of visibility solutions

Ixia has launched a new software solution for management of a wired, wireless, and/or virtual visibility solutions. The new Ixia Fabric Controller (IFC) Centralized Manager supports network packet brokers, taps, bypass switches, and cloud visibility solutions via a single graphical user interface (GUI). Today’s network infrastructure features on-premise, cloud and private data center devices faced with increasing traffic volumes and escalating security threats. According to Cisco, annual global IP traffic will reach 4.8 ZB per … More

New requirements for the secure design and development of modern payment software

The PCI Security Standards Council (PCI SSC) published new requirements for the secure design and development of modern payment software. The PCI Secure Software Standard and the PCI Secure Lifecycle (Secure SLC) Standard are part of a new PCI Software Security Framework, which includes a validation program for software vendors and their software products and a qualification program for assessors. The programs will be launched later in 2019. “Innovation in payments is moving at an … More

XebiaLabs launches new DevOps risk and compliance capability for software releases

XebiaLabs launched the chain of custody, security and compliance risk assessment tracking for software releases available for enterprise software delivery. Organizations struggle to track application release status information and understand security and compliance risks across many different applications, teams, and environments. When risk assessment, security testing, and compliance checks aren’t built into the Continuous Integration/Continuous Delivery (CI/CD) pipeline, releases fail and cause delays, security vulnerabilities threaten production, and IT governance violations result in expensive fines. … More

Wind River introduces its next-generation software framework for connected and autonomous cars

Wind River released enhancements to the Wind River Chassis portfolio of safe and secure automotive software. The latest updates to the Chassis portfolio include the integration with Wind River Titanium Cloud virtualization software that delivers reliability and latency to support the requirements of the world’s most demanding computing and communications networks. Autonomous driving, like other emerging computing applications, will usher in the need to process high volumes of data at faster speeds while avoiding the … More

Inside Secure debuts software-only solution for HDCP 2.3

Inside Secure now offers the software-only High-Bandwidth Digital Content Protection (HDCP) 2.3 solution. HDCP is a method of protecting digital entertainment content such has HD movies, pay-per-view TV or music on home and personal networks including devices such as PCs, tablets, smartphones and gaming devices. This new solution provides a simplified and secure approach to anti-piracy efforts and eliminates the need for today’s most popular content providers to store encryption keys or HDCP specs on … More

Most popular home routers lack basic software security features

It’s no secret that too many Internet of Things devices lack adequate security. But is it too much to expect that out home routers – the devices that “provide” us with a working Internet connection – implement the most basic software security hardening features? Apparently, it is, even though some of them are easy to adopt, have no downsides, and are standard practices in the desktop and mobile software markets. The analysis Parker Thompson and … More