Trend Micro Employs Serverless Computing to Scan Cloud Files for Malware

Trend Micro has developed an antimalware tool, based on a lightweight, serverless computing framework, that can scan files for malware before they are stored in cloud services. Cloud storage services have become a significant attack vector, as cybercr… Continue reading Trend Micro Employs Serverless Computing to Scan Cloud Files for Malware

JumpCloud Adds Conditional Access Policy Support

JumpCloud has added support for conditional access policies to its namesake directory to provide IT teams with the ability to restrict who can remotely access what services based on what device they are using or what network is employed. Company CTO G… Continue reading JumpCloud Adds Conditional Access Policy Support

As COVID-19 Rages, Intel Invests in Health-Check Kiosk Provider

Truyo, which builds kiosks that scan employees for indications of COVID-19 infections in a way that complies with privacy mandates, announced that Intel has made an undisclosed material investment in the company. As more employees prepare to return to… Continue reading As COVID-19 Rages, Intel Invests in Health-Check Kiosk Provider

AT&T Survey Surfaces Lots of 5G Security Confusion

AT&T has published a report that suggests more IT organizations are becoming conscious of 5G security issues heading into a year when these services should be employed more widely. Based on a survey of 1,000 IT, security and line of business leade… Continue reading AT&T Survey Surfaces Lots of 5G Security Confusion

Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints

Verizon has published a 2020 Cyber Espionage Report that finds the bulk of these types of attacks are aimed at endpoints such as desktops and laptops. Based on data collected for a previous Verizon Data Breach Investigations Report (DBIR), this latest… Continue reading Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints

Unisys Adds Visualization Tools to Stealth Platform

Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time. Vishal Gupta, ch… Continue reading Unisys Adds Visualization Tools to Stealth Platform

FireEye Acquires Respond Software to Advance Cybersecurity AI

FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, executive vice pre… Continue reading FireEye Acquires Respond Software to Advance Cybersecurity AI

Palo Alto Networks Surfaces AWS API Vulnerabilities

The Unit 42 research arm of Palo Alto Networks has published a report detailing how 22 application programming interfaces (APIs) across 16 different Amazon Web Services (AWS) platforms can be abused by cybercriminals to surface the identities of the m… Continue reading Palo Alto Networks Surfaces AWS API Vulnerabilities

Sumo Logic Finds Attack Surface Expanding

An annual report published today by Sumo Logic, a provider of security tools delivered as a cloud service, highlights the degree to which security has fundamentally shifted in the age of the cloud. Based on an analysis of data culled from more than 2,… Continue reading Sumo Logic Finds Attack Surface Expanding

Menlo Security Raises $100M for Security Service

Menlo Security today announced it has raised another $100 million in funding to fuel an effort to better secure cloud environments using the Menlo Security Isolation Platform and Adaptive Clientless Rendering (ACR) technology, which fetches and execut… Continue reading Menlo Security Raises $100M for Security Service