Security News & Reviews - Page 8

More Security News

Daily Tech Briefing - Feb. 12, 2019

Check-In System Flaw Puts Major Airlines at Risk VIDEO

DAILY VIDEO: Major airlines at risk from check-in system flaw, Wandera reports, and Dell EMC eyes the edge for open networking.

Researchers Warn of Malicious Container Escape Vulnerability

A new vulnerability in the core runc container code could potentially enable a malicious container to get access to the host operating system. Major vendors and cloud providers are already pushing out patches, but there are other things users can do to limit risk.
eWEEK logo Data Points copy

eWEEK Data Points: Five Trends Impacting the Future of DevOps

eWEEK DATA POINTS: DevOps has been a popular and successful approach to handling new-gen app development. In this article, CEO Fernando Areias of Liferay Cloud discusses the five trends he sees reshaping the world of DevOps.
Twistlock Istio

How To Secure Istio Service Mesh Deployments

The open-source Istio service mesh technology provides many security options, though a number of critical controls are not turned on by default.
CPX 360

Check Point Refining Its Security Offerings to Meet Evolving Demands

At its latest tech conference in Las Vegas, Check Point Software shares where the long-time security company is heading.
Blue Hexagon

Blue Hexagon Uses the Power of Deep Learning to Detect Network Threats

Blue Hexagon emerges from stealth with a cyber-security platform that makes use of deep learning techniques to infer when potential malware is active on a network.
Apple Logo

Apple Patches FaceTime Vulnerability in iOS, macOS Updates

Apple iOS and macOS users are strongly advised to update their devices as soon as possible with patches in the iOS 12.1.4 and the macOS Mojave 10.14.3 supplement updates, as Google warns of new zero-day vulnerabilities.
Daily Tech Briefing Feb. 8, 2019

Improper Practices Around Passwords the Focus of New Google Study VIDEO

DAILY VIDEO: Password reuse remains a barrier to safer internet use, and Google is set to advance confidential computing with its Asylo project.

eSecurityPlanet Research Shows Gaps in Security Spending, Hiring

IT SECURITY ANALYSIS: Highly publicized data breaches, increasing vulnerabilities and new privacy regulations globally are pushing companies to increase spending on trusted IT security tools, staff, and hiring. But about a third of enterprises are falling behind in upgrading their systems.

Idaptive Looks to Reduce Identity and Access Management Friction

Months after becoming a separate stand-alone business from Centrify, Idaptive is now launching its unified approach to helping organizations manage identity and access.

Netography Emerges With Autonomous Flow-Based DDoS Defense Service

The network security startup emerges from stealth with a service that looks to provide more network packet level visibility to organizations, to detect and then block potential DDoS attacks.
Confidential Computing

Google Set to Advance Confidential Computing With Asylo Project

Google is looking to further the development and advancement of a model for security known as confidential computing, which will help to protect the integrity of workloads, wherever they're running.

Enterprise Tech Videos