Search results for: zero trust

Handshake

Conceal collaborates with Barrier Networks to increase cyber resiliency of UK businesses

Conceal announced a strategic partnership with Barrier Networks, a UK-based security solutions reseller and managed service provider with clients spanning the financial, legal, HMG/MoD and public critical infrastructure sectors. “Barrier Networks provides assurance to customers that their systems are resilient to cyber attacks,” said Ian McGowan, Managing Director of Barrier Networks. “Conceal will help our customers avoid ransomware attacks at the earliest point of entry, the browser. ConcealBrowse is a highly effective, new way of … More

Money

Eclypsium raises $25 million to protect businesses from breaches through supply chains

Eclypsium has raised $25 million in Series B financing led by Ten Eleven Ventures, the original cybersecurity-focused, global, stage-agnostic investment firm. Global Brain’s KDDI Open Innovation Fund (KOIF) and J-Ventures are also participating investors in the round. New investors are joined in the round by prior lead investors Andreessen Horowitz and Madrona Venture Group, and existing investors Alumni Ventures, AV8 Ventures, Intel Capital, Mindset Ventures, Oregon Venture Fund (OVF), Translink Capital and Ubiquity Ventures. This … More

lock

API authentication failures demonstrate the need for zero trust

The use of application programming interfaces (APIs) has exploded as businesses deploy mobile apps, containers, serverless computing, microservices, and expand their cloud presence. Consequently, many APIs are developed and deployed very quickly, leading to the persistence of coding errors, with poor authentication practices numbering among the top offenses. APIs are stateless in nature, and any gap or weakness can allow an attacker to gain unauthorized access to applications or to exfiltrate data. Authenticating an API … More

cybersecurity audio books

7 cybersecurity audiobooks you should listen to this year

Audiobooks have gained enormous popularity among book lovers for a variety of factors, including their convenience, which enables listeners to learn while running errands or traveling. Here’s a list of cybersecurity audiobooks that are worthy of your time. Cybersecurity: The Insights You Need from Harvard Business Review Author: Harvard Business Review This book brings you today’s most essential thinking on cybersecurity, from outlining the challenges to exploring the solutions, and provides you with the critical … More

Infosec products of the month: September 2022

Here’s a look at the most interesting products from the past month, featuring releases from: 42Crunch, Avetta, Cloudflare, Code42, Commvault, D3 Security, Illumio, Kingston Digital, Malwarebytes, Netography, novoShield, Onfido, Socure, TransUnion, and Truecaller. Code42 Incydr enhanced detection monitors Git to protect source code and avoid IP theft Code42 has enhanced source code exfiltration detection within its Code42 Incydr product to specifically support Git push commands to personal or unsanctioned code repositories, whether GitHub, Bitbucket, Azure … More

security platform

ESET unveils new cloud and XDR solutions to improve cybersecurity for MSPs

ESET launches a new cloud and XDR solutions for Managed Service Providers (MSPs). By expanding the ESET PROTECT Platform to include ESET Inspect and ESET Inspect Cloud, MSPs and their business customers will now have access to dedicated XDR security solutions – available on prem or via the cloud. ESET also launched an all new ESET Direct Endpoint Management plugin for Kaseya VSA, as well as Native ARM Support for macOS. “With this launch, our … More

week in review

Week in review: MS Exchange zero-days exploited, AD attack paths, developing secure APIs

SpyCast: Cross-platform mDNS enumeration tool SpyCast is a cross-platform mDNS enumeration tool that can work either in active mode by recursively querying services or in passive mode by only listening to multicast packets. Attackers use novel technique, malware to compromise hypervisors and virtual machines Unknown attackers wielding novel specialized malware have managed to compromise VMware ESXi hypervisors and guest Linux and Windows virtual machines, Mandiant threat analysts have discovered. To encrypt or to destroy? Ransomware … More

Handshake

Cloudflare partners with Yubico to help customers in adopting a hardware key security model

Cloudflare has announced a new offering to make physical security keys the most accessible and economical solution for customers to better secure their business and employees. Cloudflare customers will be able to purchase Yubico’s security keys, at a “good for the Internet” cost. A zero trust security model means that no one is trusted, by default, regardless if they’re inside or outside of a corporate network. As such, verification is required from everyone trying to … More

gap

Top issues driving cybersecurity: Growing number of cybercriminals, variety of attacks

Fortifying cybersecurity defenses remains a work in progress for many organizations, who acknowledge their shortcomings but have yet to commit the necessary resources to the effort, according to new research from CompTIA. While a majority of respondents in each of seven geographic regions feels that their company’s cybersecurity is satisfactory, CompTIA’s “State of Cybersecurity” shows that a much smaller number rank the situation as “completely satisfactory.” Nearly everyone feels that there is room for improvement. … More

security platform

Illumio Endpoint prevents breaches from spreading across endpoints

Illumio announced Illumio Endpoint, a reimagined way to prevent breaches from spreading to clouds and data centers from laptops. Hybrid work has expanded the attack surface, introducing new threats and making organizations more vulnerable, so it’s become increasingly important for employees to have secure access to applications and data wherever they are located. Unlike other Zero Trust Segmentation solutions, Illumio Endpoint lets your policy follow your teams’ laptops wherever they work, whether at home, in … More

security platform

Spectro Cloud Palette Edge enhancements boost security in edge Kubernetes environments

Spectro Cloud announced new Palette Edge features, including secure “immutable” stack and new hardened edge Kubernetes distribution. Kubernetes at the edge has spurred the interest of businesses around the world as they seek to enhance competitiveness and agility. To date, however, K8s at the edge has failed to realize its true potential. Why? A study by Dimensional Research found 72% of Kubernetes users effectively said: “It’s too challenging to deploy and manage Kubernetes on edge … More

Acquisitions

Zscaler acquires ShiftRight to tackle numerous security challenges

Zscaler announced it has completed its acquisition of ShiftRight, a provider of closed loop security workflow automation. ShiftRight’s workflow automation technology is currently being integrated into the Zscaler Zero Trust Exchange cloud security platform to automate security management for the growing influx of risks and incidents organizations are experiencing. This integration will provide a simple, sophisticated solution to reduce incident resolution time dramatically. “I am excited to welcome the ShiftRight team into the Zscaler family,” … More