Security

Jaguar Network Selects NETSCOUT for Virtualized DDoS Defense

June 3, 2018
Jaguar Network Selects NETSCOUT for Virtualized DDoS Defense

NETSCOUT Systems, a leading provider of service assurance, security, and business analytics, today announced that Jaguar Network, a global provider of hosting, network, corporate telephony and cloud services, has selected the Arbor vAPS for their first network function virtualization and software-defined networking (SDN/NFV)-based DDoS protection solution. “We have been successfully using Arbor technologies for many […]

Posted in Data Center, Security, Software, Technology | No Comments »

Ziften Partners with Microsoft Windows Defender ATP Reseller Sepago

June 3, 2018
Ziften Partners with Microsoft Windows Defender ATP Reseller Sepago

Ziften, a leading provider of all-the-time visibility and control for client devices, servers, and cloud VMs, announced its entry into the German cybersecurity market in partnership with IT services and solutions partner sepago to assist with the planning, implementation, operation and support services for the Ziften Zenith security platform. sepago becomes the newest partner in […]

Posted in Market, Security, Technology | No Comments »

JASK Expands Platform Beyond SIEM

June 3, 2018
JASK Expands Platform Beyond SIEM

JASK, the provider of the industry’s first Autonomous Security Operations Center (ASOC) platform, is capturing industry demand with new features centered around enterprise-wide alert linkages and analyst workflow efficiency. Major enhancements include the JASK Navigator, a visually-driven, contextually-rich investigation console that provides SOC analysts a one-click path to situational attack awareness, multi-asset data ingestion; query […]

Posted in Security, Software, Technology | No Comments »

The Insidious Danger of Botnets: They Are Everywhere. They Are Multiplying

June 1, 2018
The Insidious Danger of Botnets: They Are Everywhere. They Are Multiplying

By Mike Spanbauer, Vice President of Research and Strategy, NSS Labs Mike Spanbauer said botnets drive attacks from DDOS to crypto-mining and crypto-jacking for coin mining. Attack targets are anything with a CPU. As for the impact of botnets: direct costs are high but the indirect effects are 10 times bigger. The issue is that […]

Posted in Development, Performance, Security | No Comments »

Can AI Solve The Internet Cybersecurity Epidemic?

June 1, 2018
Can AI Solve The Internet Cybersecurity Epidemic?

Robert Kierstead, Special Agent In Charge, Seattle Field District, US Secret Service discussed about the Secret Service’s mission – who it protects, and today’s focus on cybersecurity. This helped find credit card hacker Roman Seleznev, who was responsible for $170m worth of losses. He was caught in the Maldives even though there wasn’t an extradition […]

Posted in Government, Security | No Comments »

Zimperium Mobile Threat Detection Available in Oracle Cloud

October 4, 2017
Zimperium Mobile Threat Detection Available in Oracle Cloud

In recent weeks we have been discussing some of the ways Zimperium delivers mobile threat defense (MTD) at scale. As the only true enterprise-class MTD solution available, we take that role seriously. So we are pleased to deliver another option for enterprises to implement mobile threat defense and take advantage of available infrastructure and resources. […]

Posted in Applications, Corporate, Private Cloud, Security | No Comments »

Cybercrime As Crime, According to US Secret Service

October 4, 2017
Cybercrime As Crime, According to US Secret Service

Did you know that the lingua franca used by hackers is Russian? That language, not English, is what cybercriminals of all nationalities use to share intelligence, recruit team members, and crow about their victories on the Dark Web. Just because the information is in Russian, that doesn’t mean the players are actually Russian. That’s one […]

Posted in Government, Security | No Comments »

Cohesity Orion 5.0: The Next Level of Hyperconverged Secondary Storage

October 3, 2017
Cohesity Orion 5.0: The Next Level of Hyperconverged Secondary Storage

Cohesity, the pioneer of hyperconverged secondary storage, has recently launched Cohesity Orion 5.0, the industry’s first storage platform that combines end-to-end data protection and big data storage on distributed, infinitely scalable architecture. The latest version of Cohesity’s groundbreaking secondary storage platform delivers radical efficiency by serving double duty as a backup solution and searchable archive […]

Posted in Data, Data Center, Security | No Comments »

Cracks in the cloud: The next frontier for cybercrime

June 11, 2017
Cracks in the cloud: The next frontier for cybercrime

The advantages of cloud computing—scalability, speed to market, lower costs and higher productivity—are well known throughout most industries. But for cyber criminals, this new, borderless infrastructure is a potential goldmine. According to a new Symantec survey on the state of enterprise data security, cloud security is a top concern for Indian chief information security officers […]

Posted in Security, Trends | No Comments »

Futuriom SysSecOps Reports finds major gaps in security strategies

June 11, 2017
Futuriom SysSecOps Reports finds major gaps in security strategies

Futuriom’s two-month study on integrated systems and security operations (SysSecOps) strategy, “Endpoint Security and SysSecOps: The Growing Trend to Build a More Secure Enterprise,” reveals that many IT and security operations managers have challenges in delivering a comprehensive information security approach, including inter-department coordination, endpoint security technology integration, and resources. The Futuriom survey of 149 […]

Posted in Research, Security | No Comments »