Search results for: software


Axellio names Scott Aken as CEO

Axellio announced that Scott Aken has been named as the company’s new Chief Executive Officer. He succeeds Bill Miller, who will remain as Executive Chairman of the Board. Aken brings a wealth of expertise and a passion for securing and defending against cyber threats with more than 20 years in cybersecurity and mobile technologies. Most recently, Aken was president of Charon Technologies, a subsidiary of CACI International, where he more than doubled profit and significantly … More


Petra Jenner joins Splunk as SVP and GM for EMEA

MicrosoftSplunk announced the appointment of Petra Jenner as Senior Vice President and General Manager for Europe, Middle East and Africa (EMEA). “EMEA is home to some of the most innovative organizations in the world, and they rely on Splunk’s data platform to remain secure, resilient and innovative,” said Christian T. Smith, Senior Vice President, Chief Revenue Officer for Splunk. “Petra will help ensure we are well-positioned to scale and support our customers in the region … More


Recovering from a cybersecurity earthquake: The lessons organizations must learn

It’s been over a year since the SolarWinds supply chain hack sent shockwaves through thousands of organizations worldwide, but this cybersecurity earthquake is by no means over. More recently we’ve seen aftershocks fueled by the Log4Shell and Spring4Shell vulnerabilities, which impacted organizations using the Log4j library and the Spring Core framework. We had seen supply chain attacks before, but 2021 was the year they really took off. As was the case in the Spring4Shell and … More

security platform

Progress MOVEit 2022 allows users to secure and control all file transfer activity

Progress released Progress MOVEit 2022, the secure, automated Managed File Transfer (MFT) software that can be deployed both on premise and in the cloud. With a new add-in for Microsoft Outlook and advanced security and usability features, MOVEit 2022 makes it easier than ever for organizations to securely and intuitively share sensitive files. “Those who routinely transfer financial, personal and other sensitive data who are concerned about data security, accessibility and compliance – while also … More

week in review

Week in review: F5 BIG-IP RCE exploitation, URL spoofing flaws in Zoom, Google Docs

Here’s an overview of some of last week’s most interesting news, articles and interviews: Microsoft patches Windows LSA spoofing zero-day under active attack (CVE-2022-26925) May 2022 Patch Tuesday is here, and Microsoft has marked it by releasing fixes for 74 CVE-numbered vulnerabilities, including one zero-day under active attack (CVE-2022-26925) and two publicly known vulnerabilities (CVE-2022-29972 and CVE-2022-22713). Attackers are attempting to exploit critical F5 BIG-IP RCE Researchers have developed PoC exploits for CVE-2022-1388, a critical … More


Komodor raises $42 million to build a continuous reliability platform for Kubernetes

Komodor announced a $42 million Series B funding round led by Tiger Global with participation from Felicis and existing investors Accel, NFX Capital, OldSlip Group, Pitango First, and Vine Ventures. This brings the company’s total funding to $67 Million since launching out of stealth less than a year ago to streamline Kubernetes operations. “There’s a real challenge with day two operations when it comes to Kubernetes,” said Itiel Shwartz, CTO and Co-Founder of Komodor. “Troubleshooting … More


Sigma Computing appoints Brian Murphy as CRO

Sigma Computing announced Brian Murphy, former Okta SVP of Enterprise Sales, Americas, as the company’s Chief Revenue Officer. The appointment combines with other recent executive hires to push the company past the 200-employee mark for the first time, driven by tremendous demand from Fortune 500 and cloud-first customers looking to dramatically increase the speed and quality of their decision-making. Additional new executive hires at Sigma include Head of Demand Generation Shilpa Narwade, formerly of Google, … More

security platform

Verimatrix Key Shield enhancements reduce SoftPOS security deployments

Verimatrix announced that Verimatrix Key Shield, its engineering toolkit relied upon by organizations around the world to protect cryptographic keys, now offers enhanced features that streamline implementations for SoftPOS solutions. Software Point of Sale (SoftPoS) is new technology which allows merchants to accept card payments directly on their phone. Used to create a cryptographic architecture that keeps hackers from anticipating how to analyze and attack apps, Verimatrix Key Shield technologies dissolve cryptographic keys into the … More


Steve Fernandez joins Juniper Networks Board of Directors

Juniper Networks announced that it has appointed Steve Fernandez to its Board of Directors, effective May 11, 2022. Since 2020, Steve has served as the Global Chief Technology Officer of AIG, a leading global insurance organization, where he is responsible for developing the technology vision and operations of the enterprise. Prior to this role, he was the CTO of L’Oréal in Paris, France and led the global transformation of the company, creating a modern digital … More

open source security

A 10-point plan to improve the security of open source software

The Linux Foundation and the Open Source Software Security Foundation, with input provided by executives from 37 companies and many U.S. government leaders, delivered a 10-point plan to broadly address open source and software supply chain security, by securing open source security production, improving vulnerability discovery and remediation, and shortening the patching response time of the ecosystem. The then points can be summarized thusly: 1. Security Education – Deliver baseline secure software development education and … More

The SaaS-to-SaaS supply chain is a wild, wild mess

Cloud migration and IT democratization have created a continuously growing network of interconnected business applications, integrated to digitize and automate business workflows. Employees in the digital transformation age are now compelled to choose their best-of-breed applications, independently adopting and connecting SaaS applications, no/low code platforms like Workato and Zapier, and SaaS marketplace third-party apps in order to increase productivity, creating a convoluted web of ever-growing app-to-app integrations. This expanding new network is built in the … More

identity theft

Top tech for enterprise identity governance and security

Clear Skye and Gradient Flow announced the findings of their survey exploring the state of identity governance and security in the enterprise. The survey questioned 500+ respondents from a variety of industries, 62% of which hold job functions in information technology (IT). The findings shed light on the tools, technologies, and practices defining identity at work. The $13 billion identity management market is prime for growth, as cloud adoption, artificially intelligent software, and entry points … More