Security News > 2020

Menlo Security announces DLP solution powered by an Isolation Core
2020-02-27 03:15

Menlo Security, a leader in cloud security, announced the world's first Data Loss Prevention solution powered by an Isolation Core. "As websites use dynamic, targeted content, a DLP solution that relies on network/proxy traffic will have severely degraded data visibility. Unwilling to settle for trade-offs, we created the DLP solution that leverages our Isolation Core to provide perfect visibility to the DLP engine-something that cannot be achieved by DLP solutions without isolation."

Keysight launches new SecOps platform to improve operational security effectiveness
2020-02-27 02:15

Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced Breach Defense, a security operations platform designed to improve operational security effectiveness. An integral element of the new platform is the Threat Simulator breach and attack simulation solution which enables network and security operations teams to measure the effectiveness of operational security by safely simulating the latest attacks and exploits on live networks.

Devolutions provides enterprise-grade PAM features to SMBs
2020-02-27 02:00

Leading the way is a Privileged Access Management solution called Devolutions Password Server, which provides enterprise-grade PAM features that offer SMBs a level of protection usually only afforded to large organizations. While every business is a potential target, SMBs face unique challenges from their enterprise counterparts - yet the majority of IT software solutions currently available are complex and go well beyond what most SMBs require.

Code42 enhances its cloud data security solution to detect data threats caused by high-risk employees
2020-02-27 01:45

Code42, the leader in insider threat detection, investigation and response, announced it has advanced its cloud data security solution with the second in a series of new capabilities designed to help companies defend against the rising tide of insider threats. The newest enhancements equip security teams to closely monitor, detect and investigate data threats caused by high-risk employees.

VMware advances intrinsic security for the world’s digital infrastructure
2020-02-27 01:15

VMware, a leading innovator in enterprise software, announced new innovations to advance the company's strategy to make security intrinsic to the digital enterprise. New VMware Advanced Security for Cloud Foundation, which will enable customers to replace legacy security solutions and deliver unified protection across private and public clouds.

Nozomi Networks improves security and reliability across mixed IT, OT and IoT network environments
2020-02-27 01:00

With this latest release, the industry's most advanced solution for OT network visibility and real-time cybersecurity now includes new groundbreaking anomaly detection technology that delivers unmatched accuracy for enterprise IoT networks. The result is adaptable/flexible threat detection and response that improves security and reliability across mixed IT, OT and IoT network environments.

FireMon’s Azure, AWS integrations improve security policies for multi-cloud environments
2020-02-27 00:30

As enterprises increasingly transition and scale their operations in the public cloud, at RSA Conference 2020 FireMon announced new integrations with Microsoft Azure and Amazon Web Services to help improve cloud visibility, reduce complexity and match the pace needed to protect systems from ongoing cyber threats and data breaches. "With our latest Microsoft Azure and AWS cloud integrations, customers can now deploy consistent, seamless, and adaptive security policy orchestration across any type of infrastructure."

Wi-Fi of more than a billion PCs, phones, gadgets can be snooped on. But you're using HTTPS, SSH, VPNs... right?
2020-02-27 00:29

An eavesdropper doesn't have to be logged into the target device's wireless network to exploit KrØØk. If successful, the miscreant can take repeated snapshots of the device's wireless traffic as if it were on an open and insecure Wi-Fi. These snapshots may contain things like URLs of requested websites, personal information in transit, and so on. When these disassociation packets are received, vulnerable Wi-Fi controllers - made by Broadcom and Cypress, and used in countless computers and gadgets - will overwrite the shared encryption key with the value zero.

Privacy Management Firm OneTrust Raises $210 Million at $2.7 Billion Valuation
2020-02-27 00:23

OneTrust, a provider of privacy and security compliance tools, has raised $210 million in Series B funding at a valuation of $2.7 billion. The Series B round was led by Coatue and Insight Partners, and combined with OneTrust's $200 million Series A, brings the total amount raised by the company to $410 million.

After blowing $100m to snoop on Americans' phone call logs for four years, what did the NSA get? Just one lead
2020-02-26 22:29

The controversial surveillance program that gave the NSA access to the phone call records of millions of Americans has cost US taxpayers $100m - and resulted in just one useful lead over four years. It is perhaps no wonder that the NSA and the FBI has spent years stalling and refusing to hand over any information about the program.