‘DevOps and cyber security go hand in hand’
A report by Puppet shows that the DevOps approach and good cyber security policy complement each other. This is in contrast to the common misconception that cyber security prevents a smooth roll-out of newly developed software.
The findings are clear: "This year's findings are clear: Good secur... Read more
‘Multicloud Security-spiderweb is a complex story’
Companies are seeing their IT
systems grow ever larger. This is mainly due to the use of more and more
environments, which we call multicloud for the sake of convenience. They want
to simplify tasks at all levels with all these different environments. However,
reality teaches us that this simplific... Read more
Blockchain-based encryption makes password cracking virtually impossible
The non-profit Tide Foundation states that it has created blockchain-based encryption, which is virtually impossible to crack. The encryption method is part of an open source framework to protect personally identifiable information.
For the approach, the organization uses a technique called splinter... Read more
Palo Alto Networks focuses with acquisition Zingbox on IoT security market
Palo Alto Networks has taken over startup Zingbox for 75 million dollars (about 68 million euros). The startup, created at Stanford University, uses machine learning to detect hack attempts.
With this acquisition, Palo Alto Networks is further entering the market for Internet of Things (IoT) securit... Read more
Supermicro servers affected by various vulnerabilities
Eclypsium security researchers have found a new set of vulnerabilities in the management control firmware used on some Supermicro motherboards. As a result, more than 47,000 of the manufacturer's servers are vulnerable to attacks.
The vulnerabilities have been named USBAnywhere by the researchers. T... Read more
Social media apps greatest threat to enterprises
Social media apps bring with them most of the concerns of security professionals when it comes to potential network risks. That's what Gigamon's report says. Moreover, companies are not always aware of how many apps are actually on their network.
According to the study, companies are at risk because... Read more
Cisco publishes research manual for hacked Cisco equipment
Cisco has launched four manuals for incident responders who are investigating company equipment that they suspect has been hacked. The four manuals focus on four of the company's major software platforms.
The manuals provide step-by-step plans on how to extract forensic information from hacked devic... Read more
Siemens launches industrial hosting platform for cyber security
Siemens has released a new version of the Ruggedcom APE (Application Processing Engine). Ruggedcom APE is an industrial hosting platform designed to use third-party software applications in difficult and mission-critical environments. The platform protects networks from cyber attacks.
The new Rugged... Read more
Fileless malware attacks up 265 percent
Fileless malware - where the necessary files for an infection are not installed on the system - is becoming increasingly popular. In the first half of this year, the number of infections with this malware increased by no less than 265 percent compared to the same period in 2018.
Security company Tre... Read more
Barracuda Networks strengthens bone protection with InfiSecure technology
Barracuda Networks has adopted the collision detection technology from InfiSecure Technologies. With this technology, the company wants to strengthen its recently announced Advanced Bot Protection.
Barracuda Networks announced its Advanced Bot Protection in June. The solution - which uses artificial... Read more