API sprawl: A threat you might want to address later, but you can’t ignore it

F5 announced a report which analyzes the serious threat to business and the economy posed by the global proliferation of APIs. When APIs gained widespread adoption in the early 2000s, they were primarily viewed as a technical solution enabling applicat… Continue reading API sprawl: A threat you might want to address later, but you can’t ignore it

F5 acquires Threat Stack to strengthen its cloud security capabilities

F5 announced a definitive agreement to acquire privately held Threat Stack. F5’s application and API protection solutions combined with Threat Stack’s cloud security capabilities and expertise will enhance visibility across application infrastructure a… Continue reading F5 acquires Threat Stack to strengthen its cloud security capabilities

F5 announces new projects to scale modern application architectures

F5 announced several new developments that underscore its support for customers managing the accelerating pace of digital transformation and the critical role of open source technology in driving modern digital experiences. “Over the past year we’ve pr… Continue reading F5 announces new projects to scale modern application architectures

Imperva deepens executive bench with two new additions

Imperva names Scott Lovett as Chief Revenue Officer, and Karl Triebes as Senior Vice President of Product Management and General Manager of the Application Security business unit. Lovett brings three decades of cybersecurity sales expertise that will f… Continue reading Imperva deepens executive bench with two new additions

NIST selects Ivanti on Implementing A Zero Trust Architecture project

Ivanti announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate as a collaborator in the Implementing A Zero Trust Architecture project. The … Continue reading NIST selects Ivanti on Implementing A Zero Trust Architecture project

Illumio Core advancements help protect key assets from cyberattacks and ransomware

Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful when they break through the perimeter and move, often undetected, throughout an… Continue reading Illumio Core advancements help protect key assets from cyberattacks and ransomware

IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security Operations Center (SOC) analysts and other cybersecurity professionals. Kestrel s… Continue reading IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

Skybox Security enables proactive vulnerability remediation across hybrid environments

Skybox Security announced new vulnerability prioritization capabilities with prescriptive remediation analysis. Customers can now zero in on specific remediation options that have the greatest impact on reducing exposure to cybersecurity attacks. The n… Continue reading Skybox Security enables proactive vulnerability remediation across hybrid environments

Cato Networks expands in Germany and the DACH region

Cato Networks announced its further expansion in Germany and the DACH region. Cato opened a new PoP in Munich and made two new appointments to the sales management team in Germany. “The new Munich point of presence (PoP) joins our Frankfurt and Z… Continue reading Cato Networks expands in Germany and the DACH region