Search results for: software

Respond Software experiences explosive growth in adding expert capacity to cybersecurity teams

Respond Software, innovators in Robotic Decision Automation software, announced it grew customer acquisition 6Xs year-over-year in 2018. Additionally, its flagship product, the Respond Analyst, delivered the equivalent of 14 full-time security expert analysts on average to every Respond Software customer’s security team last year. The Respond Analyst’s ability to deploy quickly and increase the capacity of security teams appealed to a wide array of customers, including companies representing financial services, healthcare, construction, telecommunications, gaming, retail … More

Check Point and Ericom Software join forces to tackle browser-based attacks

Ericom Software unveiled the integration of Ericom Shield Remote Browser Isolation (RBI) solution with Check Point Software Technologies Advanced Network Threat Prevention. Combining Ericom Shield remote browsing technology with Check Point threat intelligence and edge security protection generates a defense that enables organizations to stay ahead of attackers, while maintaining user access to browser-based services and assets. As a defense against threats, Check Point leverages HTTPS inspection, sandboxing, threat extraction, application control, URL filtering and … More

Ixia launches new software for management of visibility solutions

Ixia has launched a new software solution for management of a wired, wireless, and/or virtual visibility solutions. The new Ixia Fabric Controller (IFC) Centralized Manager supports network packet brokers, taps, bypass switches, and cloud visibility solutions via a single graphical user interface (GUI). Today’s network infrastructure features on-premise, cloud and private data center devices faced with increasing traffic volumes and escalating security threats. According to Cisco, annual global IP traffic will reach 4.8 ZB per … More

PCI Council

New requirements for the secure design and development of modern payment software

The PCI Security Standards Council (PCI SSC) published new requirements for the secure design and development of modern payment software. The PCI Secure Software Standard and the PCI Secure Lifecycle (Secure SLC) Standard are part of a new PCI Software Security Framework, which includes a validation program for software vendors and their software products and a qualification program for assessors. The programs will be launched later in 2019. “Innovation in payments is moving at an … More

XebiaLabs launches new DevOps risk and compliance capability for software releases

XebiaLabs launched the chain of custody, security and compliance risk assessment tracking for software releases available for enterprise software delivery. Organizations struggle to track application release status information and understand security and compliance risks across many different applications, teams, and environments. When risk assessment, security testing, and compliance checks aren’t built into the Continuous Integration/Continuous Delivery (CI/CD) pipeline, releases fail and cause delays, security vulnerabilities threaten production, and IT governance violations result in expensive fines. … More

Wind River introduces its next-generation software framework for connected and autonomous cars

Wind River released enhancements to the Wind River Chassis portfolio of safe and secure automotive software. The latest updates to the Chassis portfolio include the integration with Wind River Titanium Cloud virtualization software that delivers reliability and latency to support the requirements of the world’s most demanding computing and communications networks. Autonomous driving, like other emerging computing applications, will usher in the need to process high volumes of data at faster speeds while avoiding the … More

Inside Secure debuts software-only solution for HDCP 2.3

Inside Secure now offers the software-only High-Bandwidth Digital Content Protection (HDCP) 2.3 solution. HDCP is a method of protecting digital entertainment content such has HD movies, pay-per-view TV or music on home and personal networks including devices such as PCs, tablets, smartphones and gaming devices. This new solution provides a simplified and secure approach to anti-piracy efforts and eliminates the need for today’s most popular content providers to store encryption keys or HDCP specs on … More

router

Most popular home routers lack basic software security features

It’s no secret that too many Internet of Things devices lack adequate security. But is it too much to expect that out home routers – the devices that “provide” us with a working Internet connection – implement the most basic software security hardening features? Apparently, it is, even though some of them are easy to adopt, have no downsides, and are standard practices in the desktop and mobile software markets. The analysis Parker Thompson and … More

bug bounties

EU launches bug bounties on free and open source software

After setting up a bug bounty program for VLC Media Player in late 2017, the European Commission (EC) has announced the launch of 14 new ones that will cover other free and open source software used by European Union institutions. The list of target software is as follows: Filezilla (FTP app) Apache Kafka (stream-processing software platform) Notepad++ (text/source code editor) PuTTY (terminal emulator, network file transfer app) VLC Media Player FLUX TL (the Transportation Layer … More

OPAQ awarded patent for software-defined network segmentation

OPAQ has received a patent from the United States Patent & Trademark Office for its software-defined network segmentation technology that monitors connection requests on endpoint devices and enforces security policies to prevent lateral attacks on corporate networks (Patent # 10,122,760). The patented approach is part of the OPAQ Cloud, a platform-as-a-service that enables managed service providers to deliver Fortune 100-grade security to midsize enterprises. With this technology, OPAQ can offer enforcement of security policies at … More

Pliz PNOZmulti Configurator

Vulnerability discovered in safety controller configuration software

Gjoko Krstic, an Applied Risk researcher, has discovered a vulnerability in Pilz PNOZmulti Configurator software that allows a local attacker to read sensitive data in clear-text. The software is used to configure safety controllers, providing the user with the ability to modify elements such as IP addresses, download and upload project files and run other setup functions. The tool can be found on engineering workstations which are used to configure safety controllers. The software is … More

Software AG Cloud offers open suite of cloud services

Software AG unveiled its next-generation Software AG Cloud, an open, enterprise-grade cloud platform for building, testing, deploying and managing everything from simple apps to complex, cloud-enabled enterprise and IoT applications. Software AG Cloud is a one-stop shop for “all things cloud” and provides customers and partners with subscription-based access to Software AG’s enterprise applications and middleware technology. Dr. Wolfram Jost, Chief Technology Officer, Software AG noted: “Software AG Cloud is a reliable and scalable cloud … More