Search results for: zero trust
Corsha announced a $12 million Series A funding round. Ten Eleven Ventures and Razor’s Edge Ventures co-led the round that included participation from 1843 Capital. Organizations are increasingly relying on cloud infrastructure to scale their applications and services. The sheer number of APIs per organization is exploding, and with that, so is the number of potential vulnerabilities. A GitGuardian report published last month found that organizations leaked more than 6 million passwords, API keys, and … More →
Fortinet released FortiOS 7.2, the latest upgrades to its flagship operating system and the foundation of the Fortinet Security Fabric. Over 300 new features enhance Fortinet’s ability to converge security at every network edge combined with the performance and scale needed to detect and prevent threats across an organization’s entire infrastructure. Hybrid networks and accelerating business demands Growing and scaling digital business while protecting a distributed infrastructure has never been more critical or complex. Networks … More →
Axiomatics announced the promotion of Jim Barkdoll as the company’s new chief executive officer (CEO). A cybersecurity veteran with a robust record in senior leadership positions at high-growth technology companies, Mr. Barkdoll most recently served as the company’s chief commercial officer and will continue to lead the Axiomatics sales strategy in his new role. “Though organizations have implemented authorization for some time, many now realize the traditional approach – homegrown solutions built and deployed in … More →
Veracode has released new findings that show the public sector has the highest proportion of security flaws in its applications and maintains some of the lowest and slowest fix rates compared to other industry sectors. Analysis of data collected from 20 million scans across half a million applications revealed these sector-specific findings. “Public sector policy makers and leaders recognize that dated technology and vast troves of sensitive data make government applications a prime target for … More →
Here’s an overview of some of last week’s most interesting news, articles and interviews: Spring4Shell: No need to panic, but mitigations are advised Security teams around the world got another shock on Thursday when news of disclosure of a PoC for an unauthenticated RCE zero-day vulnerability in Spring Core, a massively popular framework for building modern Java-based enterprise applications, began circulating online. Beware of old and new tax-themed scams and schemes April 18 marks the … More →
Versa Networks announced that it has moved its company headquarters location to a new facility in nearby Santa Clara, California, to accommodate current and future growth as the company continues to expand to meet escalating global demand for its differentiated SASE solutions. “Versa continues to grow the company in all departments and areas as demand for our industry-leading SASE solutions rapidly expands worldwide,” said Kelly Ahuja, CEO with Versa. “Versa SASE has continued to accelerate … More →
In this interview with Help Net Security, Vitaliy Lim, CTO at Feroot, talks about the most common JavaScript threats, the devastating impact of malicious or vulnerable code, and the importance of JavaScript security in the development process. We’re hearing a lot of JavaScript threats in the news these days. Can you tell us a little bit about these threats and why they’re so dangerous? JavaScript is a really easy programming language to hack. Hackers and … More →
CYTRACOM announced ControlOne, available exclusively to channel partners in the U.S. and Canada. The Control One cloud-based, secure network platform unifies connectivity and security with unrivaled simplicity and transforms how MSPs build, manage, and secure modern cloud networks. “Businesses increasingly turn to MSPs to securely connect the distributed workforce, and the reality is that the tools available today for MSPs are numerous yet leave much to be desired,” said Zane Conkle, Co-Founder and CEO of … More →
Absolute Software announced new product innovations, enabling organizations to track and analyze critical performance metrics spanning endpoints, users, applications, and network connections. With the new Absolute Insights for Endpoints add-on module and enhancements to the company’s Secure Access solution’s diagnostics and experience monitoring capabilities, IT and security administrators have access to historical intelligence from the firmware to the network edge, empowering them to more seamlessly manage distributed device fleets, enforce security policies, and optimize the … More →
More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and application identities in the form of digital certificates, the backbone of enterprise security, according to a report from AppViewX and the Ponemon Institute. The report, based on a survey of 1,586 IT and Security professionals on the challenges and strategies in digital identity and access management (IAM), … More →
Banyan Security released Team Edition, a no-cost version of the company’s Zero Trust Remote Access platform available for up to 20 users. This free solution is designed to provide teams with one-click, zero trust access to hosted applications and infrastructure services without the need for legacy VPNs, opening inbound firewall ports, or managing DNS. IT, Security, and DevOps teams have been putting up with poor application and resource access solutions for years. This has led … More →
Tech conversations are now peppered with a new, contentious buzzword: Web3, and we’re all likely to hear a lot more of it in the coming years. It’s an umbrella term for disparate ideas all pointing in the direction of making the internet more decentralized using blockchain-based applications. If Web3 fully materializes, which we believe will happen once a few acute shortcomings are addressed, it is going to have profound implications. Web3 optimists point to decentralized … More →