Cybersecurity Becoming Bigger SD-WAN Concern

The first wave of software-defined wide area networking (SD-WAN) was squarely focused on reducing costs by reducing the need to backhaul network traffic from every branch office to a data center. In the age of the cloud, many branch offices now make u… Continue reading Cybersecurity Becoming Bigger SD-WAN Concern

Symantec Acquisitions Further AI Strategy

Symantec this week moved this week to expand its portfolio of security offerings by acquiring Appthority and Javelin Networks as part of a larger artificial intelligence (AI) strategy being driven by a combination of internal organic research and deve… Continue reading Symantec Acquisitions Further AI Strategy

Check Point Acquires Dome9 to Advance Cloud Security

Check Point Technologies this week moved to extend the reach of its Infinity Architecture for implementing and maintaining cloud security policies by acquiring Dome9. Peter Alexander, chief marketing officer for Check Point, said Dome9 provides a mean… Continue reading Check Point Acquires Dome9 to Advance Cloud Security

FireEye Focuses on Email Security Analysis with Free Offering

FireEye has begun offering a free service through which IT organizations can evaluate their email security, as those systems have become the primary mechanism through which malware gets introduced into the enterprise. Ken Bagnall, vice president of em… Continue reading FireEye Focuses on Email Security Analysis with Free Offering

McAfee Report Points to Cyber Collusion Between China, North Korea

A report by McAfee released today suggests organized cybercriminal organizations operating out of China and North Korea may be colluding more. “Operation Oceansalt Attacks South Korea, U.S., and Canada with Source Code from Chinese Hacker Group,” deta… Continue reading McAfee Report Points to Cyber Collusion Between China, North Korea

Red Hat Extends Cybersecurity Automation Ambitions

Red Hat has announced it plans to extend the open source Ansible framework for automating IT operations into the realm of cybersecurity. Announced this month at the AnsibleFest 2018 conference, Red Hat showcased a preview of a declarative approach to … Continue reading Red Hat Extends Cybersecurity Automation Ambitions

Splunk Brings SOAR to SIEM Platform

Splunk this week at its .conf18 conference deliver on a promise to integrate the security orchestration and automation response (SOAR) technology gained through its acquisition of Phantom with the security information event management (SIEM) platform … Continue reading Splunk Brings SOAR to SIEM Platform

Cybersecurity Struggles Continue, Cisco Report Finds

A global cybersecurity survey published by Cisco Systems finds that 53 percent of small-to-medium businesses (SMBs) experienced a breach in the last year. Perhaps more importantly, that same research finds that more than (54 percent) of all cyberattac… Continue reading Cybersecurity Struggles Continue, Cisco Report Finds

Microsoft Makes Latest Cybersecurity Case

At its Microsoft Ignite 2018 conference this week, Microsoft announced what it is billing as a war against passwords by extending the reach of an existing Microsoft Authenticator application for mobile devices to an instance of Active Directory (AD) r… Continue reading Microsoft Makes Latest Cybersecurity Case