New infosec products of the week​: June 22, 2018

ExtraHop Reveal(x) sheds light on the darkspace ExtraHop announced Reveal(x) Summer 2018. The latest release includes new capabilities designed to modernize enterprise security operations with critical asset behavior analysis that instantly surfaces th… Continue reading New infosec products of the week​: June 22, 2018

Qualys, Twistlock, & Tenable – Enterprise Security Weekly #94

In the news, Infoblox research finds explosion of personal and IoT devices, Qualys announces letter of intent to acquire second front systems, Fortinet acquires Bradford Networks, Tenable extends cloud application security scanning capabilities, and mo… Continue reading Qualys, Twistlock, & Tenable – Enterprise Security Weekly #94

CASB Bitglass, WhiteHat, and Twistlock – Enterprise Security Weekly #75

CASB Bitglass, WhiteHat, and Twistlock – Enterprise Security Weekly #75 In the news, CASB Bitglass announces zero-day cloud app indexing with machine learning, WhiteHat combats code vulnerabilities with Sentinel Source for Microservices, Twistloc… Continue reading CASB Bitglass, WhiteHat, and Twistlock – Enterprise Security Weekly #75

New infosec products of the week​: September 29, 2017

Fortanix launches runtime encryption using Intel SGX Fortanix’ Self-Defending Key Management Service (SDKMS) is a cloud service delivering runtime encryption technology to protect applications and data during use. Runtime encryption allows general-purpose computation on encrypted data without exposing sensitive data to untrusted operating systems, root users, cloud providers, or malicious insiders. Manage real-time change detection for global IT environments Qualys released its highly scalable and centralized File Integrity Monitoring (FIM) Cloud App, which logs and … More Continue reading New infosec products of the week​: September 29, 2017

New infosec products of the week​: July 14, 2017

Pramati introduces ThumbSignIn biometric authentication platform Pramati Technologies announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications. It enables enterprises and service providers to deploy authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay attacks using stolen passwords. ThumbSignIn benefits organizations by enabling users to sign in to websites, web applications from desktop web browsers, and mobile apps biometrically, without a password. HPE updates Adaptive Backup and … More Continue reading New infosec products of the week​: July 14, 2017

CA Technologies acquires Veracode for $614 million

CA Technologies has signed a definitive agreement to acquire Veracode for approximately $614 million in cash. The transaction is expected to close in the first quarter of fiscal year 2018, and is subject to customary closing conditions, including regulatory approvals. The combination of CA’s portfolio with privately-held Veracode will establish CA Technologies as a leader in the Secure DevOps market through the automation and scaling of application security testing (AST) to develop and deploy applications … More Continue reading CA Technologies acquires Veracode for $614 million

New infosec products of the week​: January 20, 2017

Twistlock 1.7 comes with new runtime defense architecture Twistlock unveiled a new runtime defense architecture for its Twistlock 1.7 container security platform that enables both predictive and threat-based active protection for running containers. Introducing an intent-based security model, Twistlock 1.7 allows organizations to conduct intent analysis for container applications, spot anomalies, and enforce runtime policy – all in an automated fashion across hundreds of images with no user interaction. Carbon Black releases Cb Response 6.0 … More Continue reading New infosec products of the week​: January 20, 2017

Container security for enterprise computing

The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not have the level of visibility and control that they are accustomed to. At the same time, for DevOps to succeed, security and operations controls must be as agile and move as quickly as the assets to be protected. In this podcast recorded at RSA Conference 2016, John Morello, CTO … More Continue reading Container security for enterprise computing