Security News
Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and enterprise architects. Amid the significant increase in the number of data pipelines across their organization, 74% of data professionals indicated their organization's need for data products is growing faster than their team size.
Tavant announced the new version of its end-to-end test automation framework, FIRE 5.0. Tavant's FIRE 5.0 is a comprehensive tool and technology agnostic-test automation framework.
Cybersecurity researchers on Thursday disclosed as many as ten critical vulnerabilities impacting CODESYS automation software that could be exploited to achieve remote code execution on programmable logic controllers. The Russian cybersecurity firm noted that it detected the vulnerabilities on a PLC offered by WAGO, which, among other automation technology companies such as Beckhoff, Kontron, Moeller, Festo, Mitsubishi, and HollySys, use CODESYS software for programming and configuring the controllers.
Researchers have identified 10 vulnerabilities in CODESYS automation software for industrial control systems. "The vendor rated some of these vulnerabilities as 10 out of 10, or extremely dangerous. Their exploitation can lead to remote command execution on PLC, which may disrupt technological processes and cause industrial accidents and economic losses," said Vladimir Nazarov, Head of ICS Security at Positive Technologies.
Opengear unveiled Lighthouse Enterprise: Automation Edition, out-of-band management software solution to include automation capabilities and secure provisioning. Part of a robust, new tier of product offerings, the Lighthouse Enterprise platform has evolved to give enterprise users full visibility and future-proof management capabilities across entire networks.
Security teams need to monitor IT asset health from a cybersecurity perspective by detecting security tool blind spots and responding to exposures quickly. "As an organization focused on Security Operations, we believe that 'you can't protect what you don't understand,' with understand being the key word. Hence, asset management in the security operations context isn't just 'seeing' an asset; it is having the right 'risk' context of each and every software, hardware and IoT asset at our fingertips," said Jatinder Pal Singh, director of security operations at Informatica.
Shujinko announced the availability of free automation software to help auditors and their clients streamline SOC 2 audit preparation and readiness. This free solution includes the full capabilities of AuditX for SOC 2, automating evidence collection, mapping and crosswalking, while dramatically streamlining audit workflow and collaboration for compliance certification.
Automation can't be just about running the process, but must include three important stages. New product categories have emerged to tackle the automation challenge, including Security Orchestration, Automation and Response platforms and tools and Extended Detection and Response solutions.
Trend Micro launched a new, co-built SaaS solution with Snyk. Trend Micro Cloud One - Open Source Security by Snyk is the newest Cloud One service and the first partner addition to the platform, which is available through the channel as well as AWS Marketplace.
The webinar explores automation as it exists today in the cybersecurity industry. The question isn't what we can automate today, but what could we automate tomorrow?