Security News & Reviews - Page 6
More Security News
NEWS ANALYSIS: The database and web services giant is putting heavy capital investments into expanding its cloud infrastructure network globally, starting in North America with its Toronto data center. This is what it must do to compete head-on with Google, AWS, Dell EMC, IBM and other international...
TREND ANALYSIS: The risks to your organization are constantly changing, the level of threat is growing and you need to make sure your approach to security can keep up. A layered approach is most often the right way to go.
PRODUCT ANALYSIS: The ProtectWise Grid is a cloud-delivered network detection and response (NDR) platform that unifies network detection, full-packet forensics and integrated response in an on-demand platform for any environment—enterprise, cloud or industrial.
Oracle releases its first Critical Patch Update of 2019, with vulnerabilities in Fusion Middleware leading the way.
The startup officially launches its platform in an effort to help organizations better secure data across multicloud deployments.
A new version of Coverity Static Application Security Testing provides broader testing capabilities to help organizations find vulnerabilities in code.
DAILY VIDEO: Trustwave improves Secure Email Gateway to reduce email threats, and why Hyatt is launching a public bug bounty program.
PRODUCT ANALYSIS: Ping’s Intelligent Identity Platform provides customers, employees and partners with intelligent access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale.
TREND ANALYSIS: Major data breaches made headlines, advanced data analytics gained wider adoption, new applications for AI emerged and blockchain continued to disrupt. More of the same--only with increased data stores--is expected in 2019.
The first major milestone update to the open-source Metasploit Framework since 2011 is now available, making it easier for security researchers to test cyber-security defenses against exploits.
Researchers from CyberArk discovered a way to hack the popular Play-with-Docker training site, escaping the confines of the container isolation boundary, revealing misconfigurations that have now been fixed.
SECURITY ANALYSIS: While the term “quantum proof” in regard to encryption has been bandied about for years, the reality is that you need more than that; you also need really secure key distribution.