Security Products & Services

It's Time to Update to TLS 1.3 Already, Says CDN Engineer

It's Time to Update to TLS 1.3 Already, Says CDN Engineer

Businesses dragging their heels over rolling out TLS 1.2 on their website might have an excuse to delay a little longer: Version 1.3 of the TLS (Transport Layer Security) encryption protocol will be finalized later this year, and early deployments of it are already under way. TLS, the successor to SSL, is used to negotiate secure connections to web or mail servers, encrypting data on the move....

  • More at CIO
  • |
  • |
How to Rightly Approach Docker Security

How to Rightly Approach Docker Security

There are two key parts to Docker: Docker Engine and Docker Hub. It’s equally important to secure both parts of the system. 1) Docker Engine: It hosts and runs containers from the container image file. It also manages networks and storage volumes. There are two key aspects to securing Docker Engine: namespaces and control groups. Namespaces isolate containers from each other so that each...

Cloud Security: The Power of Shared Responsibility

Cloud Security: The Power of Shared Responsibility

When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone. For enterprises using public cloud infrastructures like Amazon Web Services (AWS) or Microsoft Azure, that shared responsibility is critical to getting any benefit from these incredibly innovative and lucrative compute platforms. Each Cloud...

Forrester: Rapid Cloud Adoption Drives up the Demand for Security Tools

Forrester: Rapid Cloud Adoption Drives up the Demand for Security Tools

The global cloud services market is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020. Its rapid growth is driving the market for cloud security tools, which will increase from $1 billion in 2016 to $3.5 billion in 2021. Researchers at Forrester recently published the Cloud Security Solutions Forecast, which includes predictions of how the market for products like cloud access...

In Light of the Cyber Executive Order- Modernizing Applications

In Light of the Cyber Executive Order- Modernizing Applications

The long-awaited Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure was released on May 11 and laid to rest many of the questions federal and industry stakeholders had concerning the Trump administration’s security plans. The order clearly places cybersecurity in the context of IT modernization. The cyber EO states that it is the...

  • More at GCN
  • |
  • |
Palo Alto Networks Introduces New Cloud-Based Security Service

Palo Alto Networks Introduces New Cloud-Based Security Service

Palo Alto Networks has announced GlobalProtect™ cloud service. The new cloud service will enable customers to utilize the preventive capabilities of the Palo Alto Networks Next-Generation Security Platform, including application visibility and control, Threat Prevention, URL Filtering, and WildFire™ threat analysis service, to secure remote networks and mobile users. With this new service,...

Arab States Purchase Cyber-surveillance Tools from BAE Systems

Arab States Purchase Cyber-surveillance Tools from BAE Systems

A year-long investigation by BBC Arabic and a Danish newspaper has uncovered evidence that the UK defense giant BAE Systems has made large-scale sales across the Middle East of sophisticated surveillance technology, including to many repressive governments. The investigation began in the small Danish town of Norresundby, home to ETI, a company specializing in high-tech surveillance equipment. ETI...

  • More at BBC
  • |
  • |
Latest Israeli Tech Fights Old Cyber Wars

Latest Israeli Tech Fights Old Cyber Wars

Cyber crimes cost financial companies an estimated $500 billion per year, and the problem is growing — leading to investments in cybersecurity companies. Jewish Voice for Peace (JVP) recently acquired a company that works from a strain of the Poison Ivy attack used by China to steal plans for the F-35 Lightning II fighter jet. Essentially, the security company uses the code within the malware...

Embedded Product Security in Medical Devices

Embedded Product Security in Medical Devices

Medical devices may have significant security risks associated with them. Let's look at the vulnerabilities they may have. 1) Prevalence of medical devices that are on open networks. Some of these applications are running very old versions of Windows. The medical devices were tested and debugged with these vulnerable operating systems years ago. Upgrading the operating system could lead to some...

  • More at CSO
  • |
  • |
Top Technologies for Information Security Identified by Gartner

Top Technologies for Information Security Identified by Gartner

Gartner highlighted the top technologies for information security and their implications for security organizations in 2017. “In 2017, the threat level to enterprise IT continues to be at very high levels, with daily accounts in the media of large breaches and attacks. As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from...

Post WannaCry Havoc, Microsoft to Disable SMB1 on all Future Windows Versions

Post WannaCry Havoc, Microsoft to Disable SMB1 on all Future Windows Versions

Microsoft has declared that the next major Windows 10 update dubbed Redstone 3, will not have SMB1 protocol. The WannaCry attacks that took down thousands of systems across the world was largely based on SMB1 exploits that were leaked by Shadow Brokers. SMB1 is a file sharing protocol that Microsoft developed in the early 90s which the company has been working to detach for a while now. The...

Symantec’s Bid to Start the Amazon of Cybersecurity Tools

Symantec’s Bid to Start the Amazon of Cybersecurity Tools

If Sheila Jordan and the rest of Symantec's senior leadership team complete their vision they will transform the company into the Amazon.com of cybersecurity, essentially a one-stop shop where CIOs and consumers alike can buy digital tools to protect their data assets. The Symantec CIO is deploying her IT department's resources to help build out a software subscription platform for SaaS...

  • More at CIO
  • |
  • |
Introducing the Palo Alto Networks Application Framework

Introducing the Palo Alto Networks Application Framework

The Palo Alto Networks Application Framework, announced on 13 June at Ignite 2017 conference in Vancouver, reinvents how their customers rapidly adopt the most compelling new security technologies, consumed via cloud-based apps developed by any provider, large or small. The framework is built on top of the Palo Alto Networks Next-Generation Security Platform, allowing their customers to access,...

Underwriters Laboratories Now Wants to Be Ubiquitous in Cybersecurity

Underwriters Laboratories Now Wants to Be Ubiquitous in Cybersecurity

Underwriters Laboratories, or UL as most people know, launched its Cybersecurity Assurance Program last year. It published its 2900 standard that covers the security of software for network-connectable devices and special supplements with additional requirements particular to medical devices and industrial control systems. Only a handful of products have been certified so far — among them, an...

Poor Endpoint Security Will Cost You Millions in Detection, Response, and Time

Poor Endpoint Security Will Cost You Millions in Detection, Response, and Time

A new study reveals organizations are wasting an average of $6m on the time to detect and contain insecure endpoints. Key findings from the study include the following: 1) Blind spots are large and growing: 63% could not monitor endpoint devices when they left the corporate network, 53% of companies reveal that malware infected endpoints have increased in the last 12 months; 2) Compliance and...

Private Cloud: Different Flavors

Private Cloud: Different Flavors

In a cloud, public or private, you don't think about the underlying hardware. Each has different features, security capabilities, and costs, but in every case, you retain a great deal of security responsibility. You can deploy on your own servers on-premises; you can deploy in a co-location center; you can even use a conventional hosting service on a "hosted-but-dedicated" basis. Most...

  • More at ZDNet
  • |
  • |

Check out the latest cyber and network security products and services.

This category provides expertly curated news on the latest and upcoming security products and services. The news covers the vast spectrum of security products and services that includes but is not restricted to IT security products, internet security products, cyber security products, data security services, IT security services, information security services, network security services, internet security services and cyber security services. It is very useful for any security team to be aware of the latest products and services that can be incorporated in their security apparatus. The news feeds served under this category help the organizational security teams identify the right products and services for their needs. The news cards contain an in-depth detail of these products highlighting their performance, configurations, niche features, pros and cons. The sole aim of these cards is to help our users to identify the right solutions and products for their respective issues.