Report Identifies 6 DevSecOps Pillars

At the Black Hat USA conference, the DevSecOps Working Group of the Cloud Security Alliance (CSA) announced it has published a report identifying the six pillars on which any set of best DevSecOps processes should be based. John Yeoh, global vice pres… Continue reading Report Identifies 6 DevSecOps Pillars

SiteLock Extends Database Security Reach to MySQL

SiteLock this week extended the reach of its tool for finding and removing malware from databases to include the open source MySQL database. Previously, the SMART Database only supported websites built using the WordPress framework. Now the company’s … Continue reading SiteLock Extends Database Security Reach to MySQL

Malwarebytes Launces Malware Remediaton Service

Malwarebytes today launched a malware removal service that makes first responders in the form of cybersecurity professionals available on-demand to organizations currently under cyberattack. Kevin Latimore, enterprise malware removal specialist for Ma… Continue reading Malwarebytes Launces Malware Remediaton Service

Juniper Networks Extends Cybersecurity Strategy

Juniper Networks has extended its campaign to tightly couple security and networking by first making it possible to block threats at the router level using alerts generated by threat feeds and then integrating a containerized firewall with the Juniper… Continue reading Juniper Networks Extends Cybersecurity Strategy

Palo Alto Networks Discovers 34M Vulnerabilities on Public Cloud

Palo Alto Networks has issued a report identifying more than 34 million vulnerabilities that exist within applications deployed on public clouds. More than 29 million of those vulnerabilities reside on Amazon Web Services (AWS) platforms, which may no… Continue reading Palo Alto Networks Discovers 34M Vulnerabilities on Public Cloud

Report Details Nature of Threats to Mobile Computing

A report published today by CrowdStrike, a provider of endpoint protection software and services, finds that attacks aimed specifically at mobile computing devices are increasing in both frequency and sophistication. As end users continue to shift awa… Continue reading Report Details Nature of Threats to Mobile Computing

DDoS-for-Hire Sites Bounce Back

Despite a recent crackdown by the Federal Bureau of Investigation (FBI), there has been a more than 400% increase in the volume of attacks being launched via DDoS-for-hire sites in the last quarter. That’s according to a new report from Nexusgua… Continue reading DDoS-for-Hire Sites Bounce Back

Symantec Expands Capabilities of Cloud Gateways

Symantec has extended the individual capabilities of its various cloud security gateways as part of an effort to make cloud security easier to manage. Gerry Grealish, head of product marketing for cloud and network security at Symantec, said each Syma… Continue reading Symantec Expands Capabilities of Cloud Gateways

Report Shines Light on Extent of SMB Insecurity

Small-to-medium businesses (SMBs) have emerged as the weakest cybersecurity link mainly because so many of them continue to rely on antiquated software that is easy to exploit. That’s the finding of a recent report from managed security services… Continue reading Report Shines Light on Extent of SMB Insecurity

Threat Stack Embeds Application Security Monitoring Tool

Threat Stack announced it has added Threat Stack Application Security Monitoring, an application runtime protection and risk detection tool, to the Threat Stack Cloud Security platform at no additional cost to users. That capability is based on runtim… Continue reading Threat Stack Embeds Application Security Monitoring Tool