Endpoint Security News Archives https://solutionsreview.com/endpoint-security/category/endpoint-security-news/ All the Latest News, Best Practices and Buyer's Guides for Endpoint Security and Protection Fri, 01 Dec 2023 21:28:39 +0000 en-US hourly 1 https://solutionsreview.com/endpoint-security/files/2023/07/SR_Icon.png Endpoint Security News Archives https://solutionsreview.com/endpoint-security/category/endpoint-security-news/ 32 32 109273813 Endpoint Security and Network Monitoring News for the Week of December 1; Inflect, Forescout, Halcyon, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-december-1-inflect-forescout-halcyon-and-more/ Fri, 01 Dec 2023 21:25:46 +0000 https://solutionsreview.com/endpoint-security/?p=5839 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of December 1. This curated list features endpoint security and network monitoring vendors such as Inflect, Forescout, Halcyon, and more. Keeping tabs on all the most relevant endpoint security and network monitoring news […]

The post Endpoint Security and Network Monitoring News for the Week of December 1; Inflect, Forescout, Halcyon, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Endpoint Security and Network Monitoring News for the Week of December 1

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of December 1. This curated list features endpoint security and network monitoring vendors such as Inflect, Forescout, Halcyon, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of December 1


Inflect Expands Instant Pricing Tool to Include Lumen Dedicated Internet Access (DIA)

Inflect, Inc., a marketplace for buyers and sellers of digital infrastructure, this week announced the availability of instant pricing for Dedicated Internet Access (DIA) from Lumen Technologies in the Inflect portal. Lumen’s integration into the Inflect portal means that customers turning to Inflect’s global digital infrastructure marketplace to source DIA can receive immediate price quotes from Lumen. This expedites the quoting process by removing the need to submit a request for pricing that may take days or weeks to complete. Instant pricing for Lumen DIA through the Inflect portal is now accessible in more than 145,000 on-net locations.

Read on for more.

Uptycs Unveils Cross-Cloud Anomaly Detection Engine

Uptycs, a unified CNAPP and XDR platform, this week announced its Cross-Cloud Anomaly Detection Engine, capable of analyzing billions of events in near-real time to help security teams rapidly identify and respond to emerging threats. Utilizing machine learning techniques Uptycs correlates anomalies with MITRE detections to further minimize the time to detect real threat behavior. This announcement comes on the heels of Uptycs’ launch of the industry’s “first” unified supply chain and runtime security for Kubernetes, which includes deep support for Amazon EKS, ECS, and connected assets.

Read on for more.

Elastic Completes Acquisition of Opster

Elastic, the company behind Elasticsearch, this week announced it has completed the acquisition of Opster, the creators of AutoOps and other tools used to help users get more out of their Elastic deployments. “I’m excited to welcome Ziv Segal and the Opster team as we continue our journey to make search better,” said Ken Exner, chief product officer, Elastic. “Joining forces will open up opportunities initially through AutoOps, which helps Elastic users detect and remediate issues, and as we look to apply Opster’s set of operational tools to future innovations.”

Read on for more.

Forescout Expands Ottawa R&D Footprint to Address Growing Market Demands

This week, Forescout, a global cybersecurity leader, officially opened its new Ottawa office– an expanded research & development (R&D) facility to help enterprises more effectively manage cyber risks and threats targeting their IT, OT and IoT devices and cyber assets. Forescout has been serving large enterprises throughout Canada for over a decade, including some of the largest financial services, healthcare and energy firms. The new Forescout Ottawa office is located at 515 Legget Dr, Kanata, ON K2K 3G4, Canada and will serve as the center of excellence to the company’s cloud security, software development, architecture, UX and data analytics teams.

Read on for more.

Halcyon Named to Fast Company’s Third Annual Next Big Things in Tech List

Halcyon, a ransomware solutions provider, announced that it has been named to Fast Company’s third annual Next Big Things in Tech list, honoring technology breakthroughs that promise to transform the future. The Halcyon Anti-Ransomware Platform is recognized on the list for its ability to detect, prevent, and recover from ransomware attacks, protecting organizations in every industry from the ever-growing threat of ransomware. Fast Company recognized a variety of technologies for their cutting-edge advancements and potential to impact consumers, businesses, and society overall, and identified Halcyon as “the only organization focused solely on combating ransomware.”

Read on for more.

The Cybersecurity Insight Jam Returns for Fifth Year on December 5th

Insight Jam LIVE, the annual element of Solutions Review’s Insight Jam, an always-on community for enterprise technology end-users, experts, and solution providers, kicks off its fifth year; starting with the Cybersecurity Insight Jam on December 5th. Expect roundtable discussions to take place throughout the day, featuring thought leaders from GitGuardian, Lenovo, Aware, LoginRadius, and more!

Read on for more.


Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

 

Preparing for the Impact of EO 14028 on Software Security

Curtis Yanko of CodeSecure examines the dark side of executing Executive Order 14028 and how it will impact private-sector software security. Despite the fact that the Cybersecurity Executive Order, known as EO 14028, governs software designed for use by government agencies, these guidelines will eventually extend to and reshape private sector software security practices– especially for hardware used in critical infrastructure and safety-critical industries, including automotive, aerospace, IoT, medical devices, and more. We can expect EO 14028, which requires software supplies to adopt NIST SSDF, a set of guidelines and best practices for secure software development, to force profound changes in private sector software security requirements. Specifically, it calls for a proactive shift to integrating security considerations across the software development lifecycle, from design and coding to testing and deployment. While this transition will necessitate a shift in mindset and resource allocation, it is a critical step toward minimizing software supply chain vulnerabilities and hardening digital assets.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of December 1; Inflect, Forescout, Halcyon, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5839
Endpoint Security and Network Monitoring News for the Week of November 10; Ribbon Communications, Checkmarx, Boldyn Networks, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-november-10-ribbon-communications-checkmarx-boldyn-networks-and-more/ Fri, 10 Nov 2023 17:00:35 +0000 https://solutionsreview.com/endpoint-security/?p=5814 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of November 10. This curated list features endpoint security and network monitoring vendors such as Ribbon Communications, Checkmarx, Boldyn Networks, and more. Keeping tabs on all the most relevant endpoint security and network […]

The post Endpoint Security and Network Monitoring News for the Week of November 10; Ribbon Communications, Checkmarx, Boldyn Networks, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Endpoint Security and Network Monitoring News for the Week of November 10

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of November 10. This curated list features endpoint security and network monitoring vendors such as Ribbon Communications, Checkmarx, Boldyn Networks, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of November 10


W3TEL Selects Ribbon Communications for Network Expansion and Regulatory Compliance

Ribbon Communications Inc., a global provider of real time communications technology and IP optical networking solutions announced this week that W3TEL a French provider of communications services to enterprises, has selected Ribbon’s solutions to “support its growth, simplify its network operations and fulfill French government mandates around call security.”

Read on for more.

Malwarebytes Launches New Endpoint Security Platform, ThreatDown

Malwarebytes, a global leader in cybersecurity solutions, this week announced the launch of ThreatDown, the product family that “protects IT-constrained organizations with effective, easy-to-use cybersecurity.” Formerly named Malwarebytes for Business, ThreatDown solutions are purpose-built to overpower threats through easy-to-use, effective technologies like the new Security Advisor dashboard and ThreatDown Bundles that combine the technologies and services needed to protect organizations from today’s sophisticated cyber landscape.

Read on for more.

Checkmarx Announces Integration with Mobb to Expand SAST Platform Capabilities

Checkmarx, an industry leader in cloud-native application security for the enterprise, announced this week an integration with Mobb, an automated vulnerability protection platform, to streamline application security testing and remediation within familiar developer workflows. Checkmarx customers can now deploy Mobb’s auto-remediation solution for vulnerabilities identified during scans with Checkmarx SAST. This new capability represents an expansion of Checkmarx’ auto-remediation offerings for SCA (software composition analysis) and IaC (infrastructure-as-code) Security.

Read on for more.

Robokiller Insights: “Drastic Spike in Robotexts and Robocalls in October”

Robotexts reached 12.8 billion while robocalls soared to 4.8 billion in October, a combined 6 percent month-over-month increase, according to Robokiller Insights. The simultaneous spike can be attributed to scammers shifting their tactics— they’re inundating Americans with well-timed scams surrounding current events like holiday shopping and student loan repayments.

Read on for more.

Boldyn Agrees to Acquire Cellnex’s Private Networks Business Unit

Boldyn Networks (Boldyn), one of the largest shared network infrastructure providers in the world, has agreed to acquire Cellnex’s private networks business unit. This largely includes EDZCOM, a Finnish pioneer and European market leader that designs, builds, and operates private 4G and 5G networks, predominantly for industrial clients in manufacturing, ports, oil and gas, energy generation, and mining. The agreement further advances Boldyn’s private networks strategy and puts it at the forefront of “driving digital transformations and industry 4.0 innovation.”

Read on for more.

AI Moment: Solutions Review Set to Host Monte Carlo & Salesforce for Exclusive GenAI Event on November 30

With the next Spotlight event, the team at Solutions Review has partnered with Monte Carlo (and their partner Salesforce) for an informative webinar show. While GenAI has its fair share of hype, data leaders are being tasked by executives with investing in AI across the business. But how can we ensure that these technologies are actually useful and impactful?

Read on for more.

Solutions Review’s William Jepma Compiles Definitive Guide on the White House’s New EO on AI, Through Quotes

As you can expect, there was a lot of discussion around the Executive Order, what it might mean for AI regulation, and how it will affect the trends involved in governing, developing, and using AI in enterprises across industries. See key commentary from industry experts who shared their thoughts on the EO and how it will change AI’s role in business.

Read on for more.


Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

 

Zero Trust: Implementing A Path Forward

Chaim Mazal of Gigamon helps pave the path forward for standardizing zero-trust architecture with these best practices to consider. Zero trust has been making waves in the cybersecurity community for more than a decade, but there’s still so much ambiguity around the concept and how to achieve it. The ultimate goal of implementing a zero-trust architecture is to remove any implicit trust in an organization’s network. Basically, the network should assume you are a malicious player unless you prove otherwise. This approach moves an organization’s security strategy away from perimeter-based controls to distributed controls across the network, including within your hybrid cloud environment. Since the onset of this concept, it’s long been thought of as a distant priority or an idealistic end goal organizations would strive to achieve one day. There was little momentum in making a true zero-trust implementation a reality, so achieving this felt unattainable. Until now.

Read on for more.

DNS Security and Protecting School Networks

Renée Burton of Infoblox says class is in session and educates us on how DNS security can help protect school networks. Advancements in IoT technologies have revolutionized the education sector, bringing about unprecedented opportunities for learning and collaboration. Online classrooms, digital resources, and interactive learning platforms have enriched learning experiences and expanded educational access for students. The reliance on wi-fi connected devices to modernize education has made IT infrastructure and network performance, in particular, mission-critical for schools. But it has also exposed schools to cyber-attacks, with ransomware looming as a significant threat. In fact, the education sector has become the top target for hackers. Personally, I experienced this firsthand when my children’s credentials were stolen from their school database. As a high school student, our kid was alerted that one of their gaming accounts had been compromised. After some investigation, it turned out that the school’s database of names, accounts, and passwords had been compromised. Attackers were able to correlate different pieces of information to exploit a number of students’ home accounts for different services. It was suspected that the initial access came from a phishing email to a staff member. Initially surprised that cyber-criminals had taken advantage of a small school system to gain access to other accounts, I learned that this was fairly common. According to the White House, “In the 2022-23 academic year alone, eight K-12 school districts throughout the country were impacted by significant cyber-attacks – four of which left schools having to cancel classes or close completely.” In addition to the monetary losses, the costs include days of missed learning for students and months of additional recovery time. The good news is that schools can get ahead of cyber-attacks before they happen– by uniting their network services and DNS security.

Read on for more.

The post Endpoint Security and Network Monitoring News for the Week of November 10; Ribbon Communications, Checkmarx, Boldyn Networks, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5814
Endpoint Security and Network Monitoring News for the Week of October 27; Tenable, Zscaler, Tufin, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-october-27-tenable-zscaler-tufin-and-more/ Thu, 26 Oct 2023 21:37:11 +0000 https://solutionsreview.com/endpoint-security/?p=5807 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of October 27. This curated list features endpoint security and network monitoring vendors such as Tenable, Zscaler, Tufin, and more. Keeping tabs on all the most relevant endpoint security and network monitoring news […]

The post Endpoint Security and Network Monitoring News for the Week of October 27; Tenable, Zscaler, Tufin, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
endpoint security and network monitoring news for the week of October 27

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of October 27. This curated list features endpoint security and network monitoring vendors such as Tenable, Zscaler, Tufin, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of October 27


Tenable and Siemens Energy Expand Collaboration on OT Cybersecurity

Tenable, Inc. an Exposure Management sol, today announced that it has expanded its partnership with Siemens Energy to further secure operational technology (OT) environments in the energy sector. Building on years of collaboration, Siemens Energy will integrate Tenable OT Security into their Omnivise T3000 control system as a network intrusion detection system (NIDS), in addition to already leveraging Tenable OT Security for asset discovery and vulnerability management. Siemens Energy’s decision to bring Tenable into this flagship offering joins existing collaboration on their recently rebranded cybersecurity service offering, Omnivise OT Security, powered by Tenable.

Read on for more.

Zscaler ThreatLabz: “400 Percent Increase in IoT and OT Malware Attacks Year-over-Year”

Zscaler, Inc., a leader in cloud security, announced this week the release of the Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report.  The number of attacks on IoT devices saw a 400 percent increase in malware compared to the previous year. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security, as the mobility of malware can facilitate movement across different networks, potentially endangering critical OT infrastructure.

Read on for more.

What to Expect at Solution Review’s Solution Spotlight with Broadcom on November 16th

With the next Solution Spotlight event, Solutions Review’s team has again partnered with Broadcom, a leader in cybersecurity and network monitoring solutions. In this webinar session, an expert from Broadcom will provide viewers with tips on enhancing the end-user experience across hybrid and multi-cloud environments.

Read on for more.

Tufin Announces Major Update and Capabilities to Tufin Orchestration Suite

Tufin, a network and cloud security policy automation solutions provider, this week announced the release of Tufin Orchestration Suite (TOS) version R23-2. The latest edition streamlines Secure Access Service Edge (SASE) policy management across an organization’s hybrid network, expedites security audits and compliance efforts, and enhances application connectivity triage, offering organizations a “comprehensive solution for their evolving security and networking needs.”

Read on for more.


Expert Insights Section

Insight Jam

Watch this space each week as our editors will share the best written and video resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

 

Social Media Scams Impacting Businesses and Individuals Today

John Wilson of Fortra’s Agari breaks down common social media scams, their impact on businesses, and how to protect yourself against them. Social media has become the proverbial double-edged sword, equal parts meaningful connection, and highly convincing fraud. The challenge is that it’s sometimes hard to spot the difference. Threat actors use social media to target companies and individuals alike with the goal of stealing information they can monetize or hocking lookalike goods. As a Senior Fellow for Threat Research, I work daily with those targeted by these criminals to take down their scams. According to research from Fortra’s PhishLabs, attacks on businesses were nearly 19 percent more common in Q4 of 2022 than in the same quarter of 2021. Companies faced an average of 73 attacks per month on their social channels. On the consumer side, the Federal Trade Commission found that in 2022, end-users lost $1.2 billion as a result of scams originating on social media. Fraudsters worldwide are flocking to these platforms as an attractive attack vector. It’s easy to see why: they offer the ability to reach a mass audience quickly and at a very low cost. Here, we’ll highlight the most common scams and how to protect yourself, your organization, and your data.

Read on for more.

Breaking Software Security To Fix It: 5 Steps to Training that Delivers More Secure Applications

Ed Adams of Security Innovation walks us through why you may need to break software security before you can fix it. Software runs the modern world, from online trading applications to cloud-based SaaS, Medical Devices, and even hardware. These software-driven systems incorporate maze-like interconnections and dependencies that make them vulnerable to attack. Compounding the challenge are the blurred lines between builders, operators, and defenders, who all have a hand in building and deploying software securely. Software’s security stakeholders have exploded beyond the core developer in the rapid-release world of agile, DevOps, and CI/CD. Cross-functional skills are more critical than ever; however, long-established training methods aren’t keeping up with emerging technologies, methodologies, and roles.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of October 27; Tenable, Zscaler, Tufin, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5807
Endpoint Security and Network Monitoring News for the Week of October 13; Xtract One, Lakera, Blackberry, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-october-13-xtract-one-lakera-blackberry-and-more/ Thu, 12 Oct 2023 20:06:08 +0000 https://solutionsreview.com/endpoint-security/?p=5785 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of October 13. This curated list features endpoint security and network monitoring vendors such as Xtract One, Lakera, Blackberry, and more. Keeping tabs on all the most relevant endpoint security and network monitoring […]

The post Endpoint Security and Network Monitoring News for the Week of October 13; Xtract One, Lakera, Blackberry, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of October 13. This curated list features endpoint security and network monitoring vendors such as Xtract One, Lakera, Blackberry, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of October 13


Xtract One Named Exclusive Preferred Supplier of the American Association of Professional Baseball

Xtract One, a threat detection and security solutions provider, this week announced that the company will serve as the exclusive preferred supplier for the American Association of Professional Baseball (AAPB). Through this three-year partnership, Xtract One will have the unique ability to advise AAPB regarding security and weapon detection technology, deploy solutions, and ensure best practices to deliver first-class fan experiences. Xtract One’s Gateway system replaces traditional metal detectors and hand wands, and delivers fast, reliable, and seamless patron screening. This solution unobtrusively scans patrons for guns, knives, and other prohibited items as they enter the facility, using AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort. The system was designed for large, ticketed venues to enable high throughput, and a brand-enhancing patron experience. With Xtract One, AAPB will eliminate long entry lines, allowing fans to quickly, and safely, enter the venue and enjoy the event.

Read on for more.

Lakera, an LLM Security Platform, Officially Launches; Backed by $10M in Funding

Swiss startup Lakera has officially launched to the world this week, with the promise of protecting enterprises from various LLM security weaknesses such as prompt injections and data leakage. Alongside its launch, the company also revealed that it raised $10 million round of funding earlier this year. Lakera has developed a database comprising insights from various sources, including publicly available open source datasets, its own in-house research, and  data gleaned from an interactive game the company launched earlier this year called Gandalf. With Gandalf, users are invited to “hack” the underlying LLM through linguistic trickery, trying to get it to reveal a secret password. If the user manages this, they advance to the next level, with Gandalf getting more sophisticated at defending against this as each level progresses.

Read on for more.

United States Department of Homeland Security Awards New PENS Contract to BlackBerry

BlackBerry Limited announced this week that the United States Department of Homeland Security (DHS) has awarded BlackBerry a new seven-year Indefinite Delivery, Indefinite Quantity (IDIQ) contract for the creation and sustainment of its new Super Enterprise for Personnel Emergency Notification System (PENS). BlackBerry, American Systems and 4 Points Technology will partner to deliver on the software and services contract, which is for DHS and all its components. The DHS will use BlackBerry AtHoc as a department-wide communication and visibility PENS solution for all its employees and contractors. BlackBerry AtHoc will deliver “super enterprise” capabilities so that the solution can be tailored to each DHS component while providing DHS with enterprise-wide functionality.

Read on for more.

Resurgence of LinkedIn Smart Links Identified in Sizable Credential Phishing Campaign

In 2022, the Cofense Phishing Defense Center (PDC) detected phishing campaigns that used LinkedIn links called Smart Links or “slink” to bypass security email gateway or SEG to deliver credential phishing. A year later, in late July into August, a resurgence of Smart Links was identified in a sizable credential phishing campaign targeting Microsoft Office credentials creeping into inboxes once again. While Smart Links in phishing campaigns are nothing new, Cofense identified an anomaly of over 800 emails of various subject themes, such as financial, document, security, and general notification lures, reaching users’ inboxes across multiple industries containing over 80 unique LinkedIn Smart Links. These links can come from newly created or previously compromised LinkedIn business accounts.

Read on for more.

NSA and U.S. Agencies Issue Best Practices for Open Source Software in Operational Technology Environments

The National Security Agency (NSA) is joining U.S. federal partners to release cybersecurity guidance to promote understanding of open source software (OSS) implementation and provide best practices to secure operational technology (OT) and industrial control systems (ICS) environments. The Cybersecurity Information Sheet (CSI) “Improving Security of Open Source Software in Operational Technology and Industrial Control Systems” offers best practices and recommendations for improving OSS security in OT/ICS environments, such as supporting OSS development and maintenance, patch management, authorization and authentication policies, and establishing common frameworks. The joint cybersecurity guidance also encourages the adoption of “secure-by-design” and “secure-by-default” principles to decrease cybersecurity risk in OT environments.

Read on for more.

Lookout Named Mobile Security Solution of the Year by the CyberSecurity Breakthrough Awards

This week , Lookout, Inc., a cybersecurity solutions provider, announced that its Lookout Mobile Endpoint Security solution has won the “Overall Mobile Security Solution of the Year” award in the Seventh Annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market. Lookout provides visibility into mobile threats and state-sponsored spyware, while also protecting against mobile phishing and credential theft that can lead to unauthorized access to sensitive corporate data. The solution analyses telemetry from more than 215 million devices, 269 million apps and more than 500 million web destinations to uncover thousands of new threats each day. Lookout is FedRAMP JAB P-ATO Authorized and available through CDM DEFEND, trusted by enterprise and government customers alike to protect sensitive data, enabling the workforce to “connect freely and safely from any device.”

Read on for more.


Expert Insights Section

expert insight badge

Watch this space each week as our editors will share the best written and video resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

Solutions Review Launches New Insight Jam Community for Enterprise Technology Professionals

We are excited to bring an entirely new distribution channel to Insight Jam, and provide our readers with guidance, best practices, and advice on top-of-mind topics in enterprise technology, and our PR and vendor partners the ability to measure their impact on the community.

Read on for more.

37 Cybersecurity Awareness Month Quotes from Industry Experts in 2023

As part of Cybersecurity Awareness Month, we called for the industry’s best and brightest to share their comments. The experts featured represent some of the top Cybersecurity solution providers with experience in these marketplaces, and each projection has been vetted for relevance and ability to add business value. A number of thought leaders were presented with this prompt: What are some overlooked cybersecurity best practices people take for granted/easily forget? Things that might be obvious to experts but not to the average enterprise user. Or best practices that are so obvious when you say them out loud, but are often forgotten. Here’s how they responded, along with some general responses from other experts and thought leaders, for Cybersecurity Awareness Month.

Read on for more.

AI’s Unprecedented Role in Revolutionizing 5G Connectivity

Manish Mangal of Tech Mahindra dives into detail AI’s unprecedented role in revolutionizing 5G connectivity. The development and standardization of 5G connectivity has been a long time coming. The groundwork for 5G started before 2015, when companies and researchers were exploring new technologies that could improve upon 4G and LTE. Little did they know that by the time 5G was ready for commercial rollout, artificial intelligence (AI) would be available to help ensure successful deployment and operation of the network. The convergence of AI and 5G networks has ushered in a new era of possibilities for the telecom industry. By combining the immense processing power of AI with the lightning-fast connectivity of 5G, operators can unlock a host of opportunities to optimize network performance, streamline operations, and pioneer innovative services. As the technology matures, its impact on the telecom industry is likely to be even greater.

Read on for more.

The post Endpoint Security and Network Monitoring News for the Week of October 13; Xtract One, Lakera, Blackberry, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5785
Endpoint Security and Network Monitoring News for the Week of September 29; Nord Security, T-Mobile, CrowdStrike, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-september-29-nord-security-t-mobile-crowdstrike-and-more/ Fri, 29 Sep 2023 15:57:15 +0000 https://solutionsreview.com/endpoint-security/?p=5776 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 29. This curated list features endpoint security and network monitoring vendors such as Nord Security, T-Mobile, CrowdStrike, and more. Keeping tabs on all the most relevant endpoint security and network monitoring […]

The post Endpoint Security and Network Monitoring News for the Week of September 29; Nord Security, T-Mobile, CrowdStrike, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 29. This curated list features endpoint security and network monitoring vendors such as Nord Security, T-Mobile, CrowdStrike, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of September 29


Nord Security Secures $100M in Funding

Nord Security, an Amsterdam, The Netherlands-based company which specializes in internet privacy and security solutions, raised $100M in funding, at a $3 Billion valuation. The round saw participation from Warburg Pincus, Novator Ventures and Burda Principal Investments. Chandler Reedy, Warburg Pincus’ Managing Director, Head of Strategic Investments, and Co-Head of Business Services, joined Nord Security’s board. The company intends to use the funds to expand its product offering and accelerate growth through strategic mergers and acquisitions.

Read on for more.

EMA and Auvik Research: “Hybrid and Remote Work Increases Challenges to Remote Network Experiences”

New research by Enterprise Management Associates (EMA) and Auvik, a provider of cloud-based network management software, revealed that the ongoing shift to hybrid and remote work environments has resulted in key changes to the roles and priorities of network administrators in order to address new connectivity challenges and prioritize and preserve a secure, productive end-user experience. The report examined the remote and hybrid work paradigm through the lens of network operations teams– 73 percent of which reported an increase in workloads, either slightly or significantly, following the shift from traditional to hybrid work environments.

Read on for more.

T-Mobile Debuts SASE Platform

This week, T-Mobile  introduced T-Mobile SASE, a network management and ZTNA (Zero Trust Network Access) platform that helps customers securely connect employees, systems and endpoints to remote networks, corporate applications and resources. Not only is it potentially the first SIM-based SASE solution, it’s also “the nation’s first solution to offer customers a secure network slice dedicated to SASE traffic.” These components are designed to help make it easier for organizations to protect corporate data and network resources from nearly anywhere.

Read on for more.

WatchGuard Acquires CyGlass Technology Services

WatchGuard Technologies, a global leader in unified cybersecurity, this week announced the acquisition of CyGlass Technology Services, a provider of Cloud and network-centric threat detection and response solutions. CyGlass’s 100 percent cloud native platform utilizes advanced artificial intelligence (AI) and machine learning (ML) capabilities to deliver “enterprise-class” cyber defense across hybrid networks, to mid-sized and small organizations at an affordable cost and without hardware. The CyGlass technology will add to the WatchGuard Unified Security Platform architecture, delivering AI-based detection of network anomalies with a future Network Detection and Response (NDR) service, and will accelerate Open eXtended detection and response (XDR) capabilities within WatchGuard ThreatSync.

Read on for more.

Appdome Launces Malware Protection Solutions for Android

Appdome, a mobile apps security solutions provider, this week announced new mobile anti-malware protections that detect Android Accessibility Service Malware such as Xenomorph, Brasdex, Octo, Sharkbot, Flubot, TeaBot, PixPirate, Sova, Spynote, Joker and more. These malware are used to carry out large scale, distributed attacks on mobile banking apps, crypto wallets, and other financial services apps. Appdome’s Cyber Defense Automation platform for mobile apps allows developers and cyber teams to build protections against Accessibility Service Malware directly into any mobile app, all from within the DevOps CI/CD pipeline with no code or coding required.

Read on for more.

CrowdStrike Set to Buy AppSec Startup, Bionic

This week, CrowdStrike announced it has agreed to acquire Bionic, an AppSec solutions provider. The combination will extend CrowdStrike’s Cloud Native Application Protection Platform (CNAPP) with ASPM to deliver comprehensive risk visibility and protection across the entire cloud estate, from cloud infrastructure to the applications and services running inside of them.  Announced at the industry’s marquee cybersecurity conference, CrowdStrike Fal.Con 2023, the signing of the deal comes on the heels of CrowdStrike’s Q2 FY24 financial results, in which the company delivered a record quarter for its fast-growing cloud security business. In addition, ending ARR as of July 31, 2023 for CrowdStrike modules deployed in the public cloud grew to $296 million, up 70 percent year-over-year

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

What to Expect at Solutions Review’s Solution Spotlight with Zscaler on October 5th

With the next Solution Spotlight event, the team at Solutions Review has partnered with Zscaler to provide viewers with a unique webinar called Deliver Fast and Secure Digital Experiences for the Modern Hybrid Workforce. In this webinar, attendees will hear how to efficiently detect, triage, and resolve IT incidents that have global, regional, or user-specific impact, at scale. Solutions Review’s Solution Spotlights are exclusive webinar events for industry professionals across enterprise technology. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in response to the overwhelming demand for these kinds of events. Solutions Review’s current menu of online offerings includes the Demo Day, Solution Spotlight, best practices or case study webinars, and panel discussions. And the best part about the “Spotlight” series? They are free to attend!

Read on for more.

Two Sides of the AI Coin: Balancing Innovation and Business Continuity

Lee Waskevich of ePlus Technology notes that adapting AI requires striking a balance between innovation and business continuity. There’s no question that artificial intelligence (AI) is radically transforming business and society as we know it, driving unprecedented innovation and unleashing creativity across virtually every sector– from healthcare to retail to manufacturing. Further, the generative AI market, which is expected to demonstrate an annual growth rate of 24.4 percent from 2023 to 2030, is just beginning to scratch the surface of what’s possible. However, while the new wave of AI continues to make the previously impossible, possible, it is also accompanied by a host of new risks and security challenges. Landing in the right place when it comes to AI starts with striking a delicate balance between accelerating innovation and minimizing threats.

Read on for more.

The Current State of Web Browsing is Wreaking Havoc on Cybersecurity

Dor Zvi of Red Access examines how the current state of web browsing is wreaking havoc on the world of cybersecurity. In just a few short years, web browsing has gone from something done primarily in our free time, to the primary activity underpinning all of our work. But, with this newfound has also come a great deal of unwanted attention. As web browsing plays an increasingly central role in the day-to-day operations of the enterprise, it simultaneously becomes a more and more attractive target to malicious actors. But, web browsing is changing in more ways than one, and already over-extended enterprise security teams are scrambling to keep up. In order to face this mounting challenge, organizations must begin by reimagining the idea of web browsing altogether — including how it is defined, where it takes place and what strategies are needed to secure it.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of September 29; Nord Security, T-Mobile, CrowdStrike, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5776
Endpoint Security and Network Monitoring News for the Week of September 15; BackBox, Plixer, Code Intelligence, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-september-15-backbox-plixer-code-intelligence-and-more/ Fri, 15 Sep 2023 14:29:41 +0000 https://solutionsreview.com/endpoint-security/?p=5752 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 15. This curated list features endpoint security and network monitoring vendors such as BackBox, Plixer, Code Intelligence, and more. Keeping tabs on all the most relevant endpoint security and network monitoring […]

The post Endpoint Security and Network Monitoring News for the Week of September 15; BackBox, Plixer, Code Intelligence, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
endpoint security and network monitoring news for the week of September 15

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 15. This curated list features endpoint security and network monitoring vendors such as BackBox, Plixer, Code Intelligence, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of September 15


BackBox Announces Strategic Partnership and Product Integration with Paessler AG

BackBox, a network automation solutions provider, this week announced a strategic partnership with Paessler AG, a monitoring solutions provider. In addition, BackBox and Paessler PRTG now work together seamlessly to support enterprise and MSP network operations teams. This integration will reduce the overall mean time to resolution when network issues are discovered.

Read on for more.

Skybox Security Unveils Next-Generation of Continuous Exposure Management Platform

Skybox Security, a provider of Exposure Management solutions, this week announced the next generation of its Continuous Exposure Management Platform. Version 13.0 delivers significant new capabilities including a new attack surface map, enhanced attack path analysis, LDAP integration, SOAR integration, and cloud infrastructure integration. Updates to the Firewall and Network Assurance products encompass general user interface improvements and NIST 800-41 Access Policy updates. These enhancements expedite compliance testing, violation identification, and proactive resolution.

Read on for more.

Checkly Expands Monitoring Capabilities with Introduction of Heartbeat Checks

Checkly, an app monitoring solutions provider, this week announced the introduction of Heartbeat Checks, a new feature that significantly expands the platform’s monitoring capabilities. Heartbeat Checks, also known as CRON monitoring or dead man’s switches, add a new dimension to Checkly’s monitoring capabilities. Contrary to Checkly’s active API and browser checks, Heartbeat checks monitor an application passively by waiting for a client to report back. Customers performing periodic actions such as sending daily status emails or monthly activity reports can now get alerted when their scheduled application actions fail. Checkly’s approach to Monitoring as Code, and their new check types now provide a 360-degree view of system health.

Read on for more.

Plixer Introduces Tom McNamara as the New Chief Executive Officer

Plixer, a network detection and response (NDR) solutions provider, this week announced the appointment of Tom McNamara as its new Chief Executive Officer. McNamara, a highly experienced executive leader, brings over 30 years of expertise in steering organizations to new heights through aggressive business growth, organizational transformation, and mergers and acquisitions. With a history of managing substantial revenues and operating budgets, McNamara is set to lead Plixer–backed by global, technology-focused investment firm Battery Ventures –into “a promising new era.”

Read on for more.

MetaGeek, an Auvik Company, Partners with Oscium

MetaGeek, an Auvik company, this week announced a technical integration with Oscium, a provider of test and diagnostics equipment. With this integration, MetaGeek’s Chanalyzer is now compatible with Oscium’s WiPry Clarity hardware, enabling tri-band spectrum analysis across the 2.4, 5 and 6 GHz bands. Customers can now plug their WiPry Clarity device into a laptop with Chanalyzer installed, and get Layer 1 and Layer 2 insights they’ve never before had access to. What’s more, the solution is highly portable for easy onsite troubleshooting.

Read on for more.

CISA Releases Open Source Software Security Roadmap

The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday published a new document detailing its plan to support the open source software (OSS) ecosystem and to secure the use of OSS by federal agencies. CISA’s Open Source Software Security Roadmap details priorities in securing the OSS ecosystem, by establishing the agency’s role in this endeavor, driving visibility into the use and risks of open source software, reducing risks to federal agencies, and hardening the ecosystem. According to the agency, it is essential to secure the OSS infrastructure, which starts by understanding the relevant vulnerabilities and attacks.

Read on for more.

DoControl Announces Integration with HRIS Platforms

DoControl, a leading SaaS Security Platform (SSP), this week announced integration with popular Human Resources Information System (HRIS) platforms such as Workday and HiBob. Through this integration, customers will have the ability to leverage metadata from these applications, enabling them to make smarter security decisions, support secure offboarding processes, as well as insider threat management for departing employees– both via resignation or termination covering more SaaS threat models.

Read on for more.

Code Intelligence Launch LLM-Powered AI-Assistant CI Spark

Code Intelligence this week announced CI Spark, a new LLM-powered AI-assistant for software security testing. CI Spark automatically identifies attack surfaces and suggests test code for them, enabling developers to reduce the manual effort needed to generate powerful white-box tests from multiple hours down to a few minutes. As part of an ongoing collaboration with Google’s OSS-Fuzz, CI Spark already helped Code Intelligence engineers uncover over 50 CVES.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

Generative AI and the Workplace

Gil Pekelman of Atera shines a light on the shadow IT created by generative AI in the workplace and the importance of safely adopting it. It is abundantly clear to anyone reading the news or working an office job that 2023 is the year of generative AI. These generative tools have absolutely revolutionized the way we work, enabling users to get answers instantly, write professional statements in mere seconds, and empower people with much-needed information with the click of a button. While having access to this new technology has the potential to completely transform how we work, learn, and live, it can also pose significant challenges for companies and their IT departments that must be addressed. In fact, the majority (67 percent) of senior IT leaders are prioritizing generative AI for their business within the next 18 months, with one-third (33 percent) naming it as a top priority. But still, 79 percent of senior IT managers are concerned that these technologies bring the potential for security risks.

Read on for more.

Uniting AppSec and Developers in The Age of Cloud-Native Applications

Shahar Man of Backslash Security explores the new world of Cloud-Native Applications, in an effort to unite AppSec teams and developers. The ever-evolving intersection of modern software development practices and the infrastructure they run on has underscored a growing friction between two critical groups within the software development arena– application security (AppSec) teams and software developers. On one hand, developers are tasked with delivering high-performing code quickly and frequently. On the other, AppSec teams are charged with maintaining stringent security measures to protect the very same software from a myriad of threats. This perceived tug-of-war has been a long-standing issue, with each party feeling somewhat impeded by the other. However, with the adoption of cloud-native architectures becoming increasingly widespread, this relationship’s importance is more critical than ever. The security of an enterprise’s crown jewels – its applications – is heavily reliant on the symbiosis between these two teams.

Read on for more.

Decoding the Complexity of TLS 1.3 Implementation: A Deep Dive

Scott Aken of Axellio dissects the complexity and importance of implementing the newly introduced TLS 1.3 protocol. As the digital ecosystem expands and evolves at a rapid pace, data security becomes a cornerstone, ensuring the integrity and seamless transmission of information. The newly introduced Transport Layer Security (TLS) protocol, TLS 1.3, marks a new chapter in online security. However, its groundbreaking advancements usher in unique and challenging implementation issues that can significantly impair our ability to monitor traffic for both internal and external threats.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of September 15; BackBox, Plixer, Code Intelligence, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5752
Endpoint Security and Network Monitoring News for the Week of September 1; Infovista, Fianu Labs, the FBI, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-september-1-infovista-fianu-labs-the-fbi-and-more/ Fri, 01 Sep 2023 14:32:43 +0000 https://solutionsreview.com/endpoint-security/?p=5743 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 1. This curated list features endpoint security and network monitoring vendors such as Infovista, Fianu Labs, the FBI, and more. Keeping tabs on all the most relevant endpoint security and network […]

The post Endpoint Security and Network Monitoring News for the Week of September 1; Infovista, Fianu Labs, the FBI, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Endpoint Security and Network Monitoring News for the Week of September 1

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 1. This curated list features endpoint security and network monitoring vendors such as Infovista, Fianu Labs, the FBI, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of September 1


Infovista and BT Proof-of-Concept Aims to Reduce Troubleshooting Time

Infovista, a global leader in network lifecycle automation, has announced a collaborative effort with BT on a proof of concept aimed at developing a new automated Root-Cause Analysis (RCA) use case for its fixed voice services. The use case, which will be showcased for the first time at TM Forum’s DTW23, demonstrates how CSPs such as BT can realize substantial operational efficiencies. Infovista predicts that the technology will be able to reduce resolution times for CSPs by more than two-thirds allowing for enhanced customer satisfaction.

Read on for more.

NordVPN Launches NordLabs to Encourage Innovation in Experimental Technologies

NordVPN, a VPN solutions provider, launches NordLabs – a platform for experimental projects and cutting-edge innovations. It will explore emerging technologies, such as AI, to create new tools and services. NordLabs will work in two main directions. First, it will provide a broader space for NordVPN’s team of engineers and developers to experiment with new ideas and emerging technologies and encourage creative thinking to explore novel approaches to online privacy and security. Secondly, the platform will allow early adopters and tech enthusiasts to gain exclusive access to innovative projects before they become mainstream. To access upcoming NordLabs experimental projects, users must register on the waiting list. Once new experimental projects are released, registered users can test and provide feedback on features and services developed by NordVPN. Signed up users can expect the first products to test in September.

Read on for more.

Fianu Labs Secures $2 Million in Seed Funding from DataTribe

Fianu Labs, a software governance automation solutions provider, this week secured a $2 million seed investment from DataTribe, a global cyber foundry that invests in and co-builds next-generation cybersecurity and data science companies. Fianu’s platform captures evidence across the DevSecOps toolchain mapped to internal policy during real-time, continuous audits against established risk controls and compliance frameworks. Each software release is accompanied by a Software Bill of Attestations (SBOA) designed to transmit immutable, audit-worthy evidence.

Read on for more.

U.S. Army Selects BackBox to Automate Multi-Vendor Network Environment

BackBox, a network automation solutions provider, this week announced the U.S. Army has selected BackBox’s Network Automation Platform to automate Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) compliance of their multivendor network environment. BackBox integrates with all major network monitoring platforms and has added new features to enable customers to easily migrate to BackBox.

Read on for more.

Aqua Security Threat Alert: “Kinsing Malware Exploits Novel Openfire Vulnerability”

Aqua Nautilus discovered a new campaign that exploits the Openfire vulnerability (CVE-2023-32315), that was disclosed in May of this year, to deploy Kinsing malware and a cryptominer. This vulnerability leads to a path traversal attack, which grants an unauthenticated user access to the Openfire setup environment. This then allows the threat actor to create a new admin user and upload malicious plugins. Eventually the attacker can gain full control over the server. In this blog, we explain the vulnerability, Kinsing’s campaign, and quantify the extent of instances potentially exposed to this specific vulnerability.

Read on for more.

FBI and Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown

This week, the FBI and the Justice Department announced a multinational operation to disrupt and dismantle the malware and botnet known as Qakbot. The action, which took place in the U.S., France, Germany, the Netherlands, Romania, Latvia, and the United Kingdom, represents one of the largest U.S.-led disruptions of a botnet infrastructure used by cybercriminals to commit ransomware, financial fraud, and other cyber-enabled criminal activity.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

Finding Business Value in the Vast Sea of Threat Intelligence

Delilah Schwartz of Cybersixgill crosses over the vast sea of threat intelligence, in search of added value by combining the right tools. The continued acceleration of highly sophisticated cyber-attacks impacts countless organizations, their brand’s reputation, and their bottom line. This situation puts growing pressure on security leaders to effectively and successfully reduce organizational threat exposure across a rapidly proliferating attack surface. Without the means to identify the threats that pose the most significant risk to their organizations, security teams continue to fight cyber warfare like playing a game of whack-a-mole, addressing issues as they occur without successfully getting ahead of malicious actors. Cyber threat intelligence plays a vital role in cyber warfare and is no longer a “nice-to-have” but a “need-to-have” weapon. With the right intelligence tools, teams can derive critical insights into the emerging tactics, techniques, vectors, and procedures that could expose their network to attack. But selecting the right threat intelligence products and services to maximize business value is not easy.

Read on for more.

Home Grown: How to Fill the Cybersecurity Talent Gap from the Inside

Pieter Danhieux of Secure Code Warrior discusses how filling the cybersecurity talent gap starts with getting everyone on board with security familiarity. The universal corporate culture still generally believes that outside hiring represents the primary way to fill in talent gaps. However, given the mounting hiring costs and the severe consequences of cyber threats, CISOs would greatly benefit from re-evaluating how they address the situation by looking within. Instead of the traditional recruitment of outside candidates, we should leverage proven, internal performers. Those performers may not be highly skilled security professionals. But by providing proper learning pathways and support, leaders can empower them to take on critical roles in cyber defense.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

 

The post Endpoint Security and Network Monitoring News for the Week of September 1; Infovista, Fianu Labs, the FBI, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5743
Endpoint Security and Network Monitoring News for the Week of August 11; Entara, EY, Cloudflare, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-august-11-entara-ey-cloudflare-and-more/ Thu, 10 Aug 2023 20:48:40 +0000 https://solutionsreview.com/endpoint-security/?p=5727 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of August 11. This curated list features endpoint security and network monitoring vendors such as Entara, EY, Cloudflare, and more. Keeping tabs on all the most relevant endpoint security and network monitoring news […]

The post Endpoint Security and Network Monitoring News for the Week of August 11; Entara, EY, Cloudflare, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Endpoint Security and Network Monitoring News for the Week of August 11

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of August 11. This curated list features endpoint security and network monitoring vendors such as Entara, EY, Cloudflare, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of August 11


Entara Announces Launch of Vulnerability Management as a Service

Entara, a cybersecurity solutions provider, this week announced the launch of a new cybersecurity offering, Vulnerability Management as a Service (VMaaS). The offering allows Entara’s clients increased hardening against evolving cyber threats through consistent identification and remediation of vulnerabilities and risks. Entara VMaaS is a long-term service that regularly scans client environments, including workstations, servers, and networking appliances, to identify risks and vulnerabilities that may expose an environment to an attack. The firm identifies, prioritizes, remediates, and reports on vulnerabilities that can be caused by things such as updates in systems and software not being correctly patched, Zero Day vulnerability exploits, misconfigured security settings, and changes in vendor or community security standards.

Read on for more.

Appdome Launches Cyber Community Program with Pen Testers Around the World

Appdome, a mobile app security solutions provider, announced the launch of its new Mobile App Defense Project, a community program aimed at improving mobile DevSecOps through collaboration with more than 50 renowned mobile app penetration testers around the world. This initiative aims to foster a more secure mobile app economy, raise the bar on mobile app defense and provide rapid, validated, continuous cyber and anti-fraud solutions for all mobile applications globally.

Read on for more.

Menlo Security Introduces “Industry-First” AI-Powered Phishing and Ransomware Protection

Menlo Security, a browser security solutions provider, recently announced HEAT Shield and HEAT Visibility, the “industry’s first” suite of threat prevention capabilities designed to detect and block highly evasive threats targeting users via the web browser. Menlo Security HEAT Shield and HEAT Visibility are built on Menlo Security’s cloud-based Isolation Core, which monitors and analyzes over 400 billion web sessions annually. HEAT Shield leverages the Isolation Core to support dynamic security policies which can be applied to users based on web session events and behavior to prevent attackers from gaining access to the endpoint. Individuals are protected from potential threats without any impact on the end-user experience.

Read on for more.

EY launches Intelligent Extended Detection Response Solution

The EY organization announced this week the EY Intelligent Extended Detection & Response (IXDR) solution, in collaboration with cybersecurity provider Secureworks. IXDR is a service providing 24×7 threat monitoring, detection and response on an open XDR platform that leverages threat intelligence research, artificial intelligence (AI), machine learning (ML) algorithms and modern data pipelines to help organizations drastically reduce the response time to cyber threats, working to potentially bring it down to minutes. As part of the Enterprise Intelligent Cyber Resilience transformation life cycle, IXDR supports organizations to help achieve detailed visibility and control over their network and security fabric, helping them stay ahead of sophisticated cyber attacks and potential threats.

Read on for more.

Alkira and Itential Announce Platform Integration

Alkira and Itential, two names in cloud network security, this week announced the integration of their two platforms, bringing automation, simplicity, speed and control to cloud networking for enterprises. Together the two platforms give enterprises the ability to deploy, manage and operate enterprise grade networks for cloud and on-prem with full end-to-end automation, reducing time to market for business-critical services.

Read on for more.

NetSPI Debuts ML/AI Penetration Testing

NetSPI, a leader in cybersecurity solutions, this week debuted its ML/AI Pentesting solution to bring a more holistic and proactive approach to safeguarding machine learning model implementations. The “first-of-its-kind” solution focuses on two core components: Identifying, analyzing, and remediating vulnerabilities on machine learning systems such as Large Language Models (LLMs) and providing grounded advice and real-world guidance to ensure security is considered from ideation to implementation. NetSPI’s ML/AI Pentesting solution caters to organizations seeking to enhance the robustness, trustworthiness, and security of their ML systems, with a particular focus on LLMs.

Read on for more.

Cloudflare Announces Project Cybersafe Schools to Better Secure K-12 School Districts For Free

Cloudflare, a cybersecurity solutions provider, this week introduced a new initiative aimed at improving cybersecurity for K-12 public school districts at no cost: Project Cybersafe Schools. This new program will provide a suite of Zero Trust cybersecurity solutions to give small school districts faster, safer Internet browsing and email security– at no cost, and with no time limit. To be eligible, Project CyberSafe School participants must be K-12 public school districts located in the United States with up to 2,500 students in the district. The offerings to eligible school districts will be at no cost, with no time limit, and can be used as a technology protection mechanism for Children’s Internet Protection Act (CIPA) compliance.

Read on for more.

Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

What to Expect at Solutions Review’s Spotlight with Cloudflare on September 19

With the next Solutions Spotlight event, the team at Solutions Review has partnered with network solutions provider, Cloudflare. Join this webinar to understand the profound impact DDoS attacks can have on an organization’s bottom line and how investing in proactive defenses can yield substantial returns.

Read on for more.

Is Your Security Stack Ready for Generative AI?

Ashley Leonard of Syxsense examines the current and future state of Generative AI, while posing the question, “Is your security stack ready?” Businesses are eager to unlock AI’s full potential to easily create new content (through text, audio, images, synthetic data, and more), and to some extent, quicken the technological evolution of their existing products and services. While the craze is understandable, there are also concerns about transformative technology – especially when it comes to cybersecurity. For example, there have already been reports of threat actors abusing generative AI through indirect prompt injections that compromise LLM-integrated applications. And Meta’s 65-billion parameter language model was also recently leaked, enabling threat actors to carry out more personalized spam and phishing attacks, and a host of other fraudulent cyber activities. But misusing technology is just one item on a long list of concerns associated with generative AI and cybersecurity. Sadly, integrating the technology could also leave your business susceptible to copyright infractions, efficacy issues, employee displacement, and ethical missteps. However, the upside of AI in security is too big to ignore and when applied responsibly, it can accelerate and enhance your security posture (or offering).

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of August 11; Entara, EY, Cloudflare, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5727
Endpoint Security and Network Monitoring News for the Week of July 28; Protect AI, Mimecast, EPAM, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-july-28-protect-ai-mimecast-epam-and-more/ Thu, 27 Jul 2023 19:57:25 +0000 https://solutionsreview.com/endpoint-security/?p=5662 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of July 28. This curated list features endpoint security and network monitoring vendors such as Protect AI, Mimecast, EPAM, and more. Keeping tabs on all the most relevant endpoint security and network monitoring […]

The post Endpoint Security and Network Monitoring News for the Week of July 28; Protect AI, Mimecast, EPAM, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Endpoint Security and Network Monitoring News for the Week of July 28

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of July 28. This curated list features endpoint security and network monitoring vendors such as Protect AI, Mimecast, EPAM, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of July 28


Protect AI Raises $35M in Series A Financing

Protect AI, an AI/ML security company, this week announced it has closed a $35M Series A round of funding led by Evolution Equity Partners with participation from Salesforce Ventures and existing investors Acrew Capital, boldstart ventures, Knollwood Capital and Pelion Ventures. To date, the company has raised a total of $48.5M to help organizations protect ML systems and AI applications from unique security vulnerabilities, data breaches and emerging threats.

Read on for more.

Palo Alto Networks Introduces CI/CD Security Module

This week, Palo Alto Networks introduced the CI/CD Security module to provide integrated software delivery pipeline security as part of their code-to-cloud capabilities in Prisma Cloud’s CNAPP platform. The CI/CD Security module enables DevOps and security teams to better collaborate and improve security outcomes throughout the application life cycle.

Read on for more.

Mimecast Announces Protection for Microsoft Teams

Mimecast Limited (Mimecast), an advanced email and collaboration security company, this week announced an August 2023 release of Protection for Microsoft Teams for its Email Security Cloud Integrated customers. Security solutions for additional collaboration channels, such as Microsoft SharePoint, Microsoft OneDrive, Slack, and Google Workspace will follow.

Read on for more.

DocuSign, PresentID, and Microsoft All Announce New Face Biometrics Capabilities

Among those launching verification products is DocuSign, the U.S. electronic signature and agreements management company. In a release, DocuSign said it has upgraded its Liveness Detection for ID Verification tool, which can now detect spoofing, “confirm signers are who they say they are, are physically present at signing and that their IDs are valid.” The software was developed with United Kingdom-based identity verification firm Onfido and compares video selfies to photo IDs. In France, deep-tech cybersecurity firm PresentID says it’s integrating face liveness and voice biometrics into its remote identity verification software. A company release says that its software works for financial institutions, marketplaces, dating apps and other platforms. A post on Microsoft’s documentation site outlines how its Azure AI Face provides face biometrics services and technologies across the verification industry. Azure AI Face performs ID-to-face matching for more efficient onboarding, verification and other identification processes. Its face detection API locates faces and analyzes landmarks and attributes, such as head position or the presence of jewelry or glasses. It also accounts for signal noise, occlusion and blur. The post specifies that “the values returned by the API for each attribute are predictions of the perceived attributes and are best used to make aggregated approximations of attribute representation rather than individual assessments.”

Read on for more.

EPAM Takes Home U.S. Migrate Partner of the Year Award

EPAM Systems, Inc., a leading digital transformation services and product engineering company, this week announced it has won the 2023 Microsoft U.S. Azure Migration Partner of the Year Award. The Company was honored among a global field of top Microsoft partners for demonstrating excellence in innovation and implementing customer solutions based on Microsoft technology. EPAM also secured the global finalist position in the Industry, Retail and Consumer Goods category for exceptional contributions at Estée Lauder Companies and Ahold Delhaize and placed as a U.S. finalist in the Global Retail and Consumer Goods category. Additionally, EPAM achieved the U.S. finalist position in Azure Modernize for its work at Ahold Delhaize.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Expert Insights Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

Solutions Review Set to Host Infinidat for Exclusive Spotlight Webinar on August 15

With the next Solutions Spotlight event, the team at Solutions Review has partnered with leading enterprise data and cloud solution provider Infinidat. This session will demonstrate how easily enterprises can create cyber-resilient storage environments that can withstand and recover from cyber-attacks.

Read on for more.

Navigating Cyber Complexity with an Integration Mindset

Julian Martin of Mimecast takes the helm and helps navigate through the waves of cyber complexity by applying an integration mindset. The complexity afflicting cybersecurity teams far and wide is well-documented. From widespread staffing shortages to bloated tool sprawl, cloud-based hybrid enterprises are navigating a sea of complications when defending against highly sophisticated threats. In response, the concept of tool consolidation has emerged as a hot-button buzzword– the silver bullet for finding a simplified solution to the complexity problem. But beneath the surface and beyond the untrained eye, the situation isn’t really that simple.

Read on for more.

The MOVEit Effect: Protecting Public-Facing Applications

Kiran Chinnagangannagari of Securin looks at the impact of the MOVEit exploit for answers in protecting public-facing applications. Organizations globally use public-facing applications every day to keep their businesses running. Servers, virtual private networks (VPNs), and application programming interfaces (APIs) are all common forms of third-party, public-facing applications that make accessing a service or completing work more efficient — but less secure. Many of these web-based applications can be used as a point of entry by bad actors to exploit vulnerabilities, gain access to proprietary information, and hold systems for ransom. Organizations involving strict compliance laws – like healthcare or finance – can be at elevated risk of damages from a data breach.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of July 28; Protect AI, Mimecast, EPAM, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5662
Endpoint Security and Network Monitoring News for the Week of July 21; Postman, Actility, Sonar, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-july-21-postman-actility-sonar-and-more/ Fri, 21 Jul 2023 14:58:28 +0000 https://solutionsreview.com/endpoint-security/?p=5653 The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of July 21. This curated list features endpoint security and network monitoring vendors such as Postman, Actility, Sonar, and more. Keeping tabs on all the most relevant endpoint security and network monitoring news […]

The post Endpoint Security and Network Monitoring News for the Week of July 21; Postman, Actility, Sonar, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Endpoint Security and Network Monitoring News for the Week of July 21

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of July 21. This curated list features endpoint security and network monitoring vendors such as Postman, Actility, Sonar, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Endpoint Security Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of July 21


Postman Acquires Akita Software

Postman, an API Platform, this week announced it has acquired Akita Software, a monitoring and observability solutions provider. This is Postman’s first strategic acquisition since hitting a major milestone of 20M users. Postman will integrate Akita’s API discovery and monitoring capabilities into its platform to deliver tooling to help organizations “thrive in an API-first world.” Akita’s addition will make it easier than ever for users to manage their production APIs, even in the face of API sprawl. Managing too many APIs or microservices is a top obstacle to producing APIs, according to nearly one in four respondents in Postman’s 2023 State of the API Report, which surveyed over 40,000 professionals. At large enterprises, API sprawl is even worse: almost one in three respondents say it’s an obstacle. Akita’s capabilities for API discovery and monitoring make it possible to automatically manage APIs by simply allowing Akita’s agent to watch API traffic.

Read on for more.

Lookout Report: “Android Surveillanceware Attributed to China’s APT41”

Lookout, Inc., the endpoint-to-cloud security company, this week announced the discovery of two new advanced Android surveillanceware instances, WyrmSpy and DragonEgg, attributed to the high-profile Chinese threat group APT41. Despite being indicted on multiple charges by the U.S. government for its attacks on more than 100 private and public enterprises in the U.S. and around the world, APT41’s tactics have evolved to include mobile devices. Customers of Lookout Mobile Endpoint Security are protected from these threats.

Read on for more.

Actility Acquires Acklio

Actility, an IoT network infrastructure solutions provider, this week announced the acquisition of Acklio, a provider of SCHC (Static Context Header Compression) technology for LPWAN (Low Power Wide Area Network) networks. This acquisition will further strengthen Actility’s position as a leader of end-to-end IoT solutions and will enable the company to offer a broader range of IP-based IoT applications over LPWAN networks.

Read on for more.

Endor Labs Releases “State of Dependency Management 2023” Report

Endor Labs, creator of the Code Governance Platform, today released “State of Dependency Management 2023,” a new research report exploring emerging trends that software organizations need to consider as part of their security strategy, and risks associated with the use of existing open source software (OSS) in application development. In particular, as modern software development increasingly adopts distributed architectures and microservices alongside third party and open source components, the report tracks the astonishing popularity of ChatGPT’s API, how current large language model (LLM)-based AI platforms are unable to accurately classify malware risk in most cases, and how almost half of all applications make no calls at all to security-sensitive APIs in their code base. The report emphasizes how these issues need to be prioritized in every organization’s security strategy.

Read on for more.

New Research Released from Sonar on Cost of Technical Debt

This week, Sonar released a research report that examines the millions of dollars that businesses lose when they fail to implement an optimal approach for software development. The research, based on an examination of over 200 projects within a 12-month span, calculates that the attributed technical debt cost is $306,000 per year for a project of one million Lines of Code (LoC). This is equivalent to 5,500 developer hours spent on remediation, development time that could be put towards more innovative and valuable projects.

Read on for more.

Coursera Announces First Entry-Level Professional Certification

Earlier this week, Coursera announced that Microsoft launched its first entry-level Professional Certificate on Coursera, the Microsoft Cybersecurity Analyst Professional Certificate. This program is designed to help learners develop the in-demand skills needed for a successful career in cybersecurity. This program doesn’t require previous experience or education, and requires only six months for beginner-level learners to get hands-on practice in Microsoft Azure, network security, cloud computing security, computer security incident management, threat mitigation, and more.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry experts together to publish the web’s leading insights for enterprise technology practitioners.

NDR: The Vital Ingredient For A Successful XDR Strategy

Mark Doering of NETSCOUT dons his chef’s hat and looks at why NDR is a vital ingredient when cooking up an XDR strategy.

In the world of enterprise security, numerous technology options are available, causing companies to make difficult decisions when it comes to designing their security strategies. Despite the options, security teams are constantly searching for the ‘secret sauce’ or the best and most effective way to integrate security tools that will achieve a strong ROI. One of those ingredients is a successful Extended Detection and Response (XDR) strategy, which offers visibility across multiple data in one platform. This strategy, however, can only exist with the inclusion of Network Detection and Response (NDR), which focuses on analyzing packet data in network traffic rather than logs, endpoints, or other data streams. In this article, we will explore the intricacies of designing a comprehensive XDR strategy, why packet-based NDR solutions must be a vital part of that strategy, and why combining both security solutions is the ideal posture for a more robust, real-time view of today’s rapidly-evolving threat landscape and dynamic attack surface.

Read on for more.

Download Link to Endpoint Security Buyer's Guide

The post Endpoint Security and Network Monitoring News for the Week of July 21; Postman, Actility, Sonar, and More appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5653