IBM Integrates Data Security

IBM Security today announced it is adding data security capabilities to IBM Cloud Pak for Security for the first time. Built on top of the Red Hat OpenShift platform, IBM Cloud Pak for Security is an integrated suite of threat management tools and pro… Continue reading IBM Integrates Data Security

Orca Security Finds 400,000+ Virtual Appliance Vulnerabilities

Orca Security, a provider on security scanning tools, disclosed today that it has found 401,571 vulnerabilities on 2,218 virtual appliance images from 540 software vendors. Company CEO Avi Shua said virtual appliances are essentially black boxes that … Continue reading Orca Security Finds 400,000+ Virtual Appliance Vulnerabilities

DH2i Extends Software-Defined Perimeter to IoT Devices

DH2i has launched DxOdyssey for IoT, an instance of its software-defined perimeter (SDP) and smart availability software encapsulated in a lightweight container to enable it to run on internet of things (IoT) devices. Company CEO Don Boxley said DxOdy… Continue reading DH2i Extends Software-Defined Perimeter to IoT Devices

Ivanti Acquires MobileIron and Pulse Secure

Ivanti this week announced it has entered into a pair of agreements to acquire MobileIron and Pulse Secure as part of an effort to create a zero-trust platform that can be delivered as a service. Nayaki Nayyar, chief product officer for Ivanti, said a… Continue reading Ivanti Acquires MobileIron and Pulse Secure

Zscaler Extends Security Services Reach

Zscaler has extended the reach of its security service to now include protection capabilities add cloud browser isolation along with cloud security posture management (CSPM) for software-as-a-service (SaaS) applications and a cloud access security bro… Continue reading Zscaler Extends Security Services Reach

CSA Report Surfaces Cloud Attack Patterns

The Cloud Security Alliance (CSA) this week published a free report intended to make it easier for cybersecurity teams to recognize and thwart the most 11 egregious threats to cloud computing environments. John Yeoh, global vice president of research … Continue reading CSA Report Surfaces Cloud Attack Patterns

IBM Launches Security Assessment Service Focused on Business Risk

IBM Security this week launched a service through which it will work with IT security professionals to assess the business risks cybersecurity vulnerabilities represent. Julian Meyrick, vice president for IBM Security, said the Risk Quantification Ser… Continue reading IBM Launches Security Assessment Service Focused on Business Risk

Barracuda Networks Centralizes Security Across Azure SD-WAN

Barracuda Networks announced today it has extended the CloudGen WAN gateways that it deploys in Microsoft Azure Virtual WAN Hubs to enable cybersecurity teams to apply multi-factor authentication to remote users using policies enforced by Microsoft Az… Continue reading Barracuda Networks Centralizes Security Across Azure SD-WAN

RangeForce Expands Security Training Cloud Service

RangeForce today unfurled Battle Fortress Cyber Range, a cloud-based service through which red/blue teams can conduct security training using modules and content they can reuse across multiple exercises. Will Munroe, vice president of marketing for Ra… Continue reading RangeForce Expands Security Training Cloud Service

Palo Alto Networks Moves to Secure SD-WANs

Palo Alto Networks today launched a software-defined wide area network (SD-WAN), Palo Alto Networks Next-Generation SD-WAN, based on the platform it gained by acquiring CloudGenix earlier this year. Anand Oswal, senior vice president of product manage… Continue reading Palo Alto Networks Moves to Secure SD-WANs