Security News > 2021

How to Effectively Prevent Email Spoofing Attacks in 2021?
2021-03-29 04:45

Email spoofing is used in phishing attacks to trick users into believing the message is from a person or entity they either know or can trust. Email spoofing is possible because the email system used to represent email addresses provides no way for outbound servers to verify the legitimacy of the sender's address.

Why certificate automation is no longer just “nice to have”
2021-03-29 04:30

As internet standards groups look to boost trust and security through new requirements for shorter certificate lifecycles and online privacy acts introduce increasingly punitive regulatory mandates, the business risks of certificate management are only increasing. How the four pillars of certificate automation are shaping the next normal.

The importance of a zero trust-based approach to identity security
2021-03-29 04:00

Security leaders embracing zero trust identity security. 88 percent of respondents said adopting more of a zero trust approach is "Very important" or "Important."

PHP's Git Server Hacked to Insert Secret Backdoor to Its Source code
2021-03-29 03:51

In yet another instance of a software supply chain attack, unidentified actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert a secret backdoor into its source code. The changes, which were committed as "Fix Typo" in an attempt to slip through undetected as a typographical correction, involved provisions for execution of arbitrary PHP code.

As DX acceleration continues, identity and zero trust need to be central in all business decisions
2021-03-29 03:30

The pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security, according to a survey from Ping Identity. "Business leaders have been faced with an urgent need to invest more in identity security capabilities to effectively secure employees and customers in a dispersed work environment," said Andre Durand, CEO of Ping Identity.

Data center market size to reach $519.34 billion by 2025
2021-03-29 03:00

The data center market research from Technavio indicates neutral growth in the short term as the business impact of COVID-19 spreads. This will drive the demand for the upgrade of the existing data center network infrastructure and there will be an increase in new data centers being constructed closer to the data origins for reducing latency.

Siemens unveils Veloce, a hardware-assisted verification system
2021-03-29 02:00

Siemens unveiled its next-generation Veloce hardware-assisted verification system for the rapid verification of highly sophisticated, next-generation integrated circuit designs. Veloce Strato+, a capacity upgrade to the Veloce Strato hardware emulator.

Solvo’s cloud security solution addresses future changes and new apps’ component deployments
2021-03-29 01:30

Solvo announced the general availability of its cloud security solution designed to solve cybersecurity challenges that both developers and security teams are experiencing today. The solution integrates with existing workflows versus trying to change them, and addresses growing security challenges by creating and maintaining a least-privilege security policy for cloud native applications.

Elastic Security 7.12 accelerates threat hunting workflows and prevents ransomware
2021-03-29 00:45

Elastic announced new updates across the Elastic Security solution in the 7.12 release to accelerate threat hunting and investigation workflows, prevent ransomware, and eliminate blind spots. Elastic Security streamlines security operation workflows and helps practitioners maximize data insights with analyst-driven correlation.

Threat Stack Cloud Security Platform now offers real-time threat and anomaly detection in the cloud
2021-03-29 00:30

Threat Stack announced the Threat Stack Cloud Security Platform now offers new security analytics. Threat Stack now allows organizations to proactively assess and strengthen an organization's security posture by quickly accessing, filtering, and visualizing security data.