Security News

Sevco Security raises $15M to scale adoption of the cloud-native security asset intelligence platform
2021-07-01 23:00

Sevco will use the funding to scale adoption of the cloud-native security asset intelligence platform that delivers two fundamental values to customers: continuous converged visibility of all assets across siloed systems; and the telemetry required to understand how assets change in a dynamic environment over time. "Led by two executives who helped create the EDR market, Sevco knows how to innovate and operationalize technology for the masses. We believe Sevco will bring the same disruption to security asset intelligence that they did to endpoint security."

Enhancing cloud security with a two-step cryptography technique
2021-07-01 04:00

While there are many different encryption techniques, none are completely secure, and the search continues for new technologies that can counter the rising threats to data privacy and security. In a recent study published in KeAi's International Journal of Intelligent Networks, a team of researchers from India and Yemen describe a novel, two-step cryptography technique - the first to combine genetic technology with mathematical technique.

Extreme Networks extends leadership position among cloud-managed network services providers
2021-06-30 22:45

Extreme Networks announced it is one of the fastest growing cloud-managed network service providers and is the second-ranking brand in the industry as reported in 650 Group's June 2021 Cloud-Managed Network Services Report. According to 650 Group, the cloud-managed network services market experienced 38% growth year-over-year from 2020 to 2021, while Extreme delivered 101% growth during that same period.

Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
2021-06-30 04:00

According to the 200 CISOs and other security decision makers who participated in the survey, nearly 60% consider lack of visibility as well as inadequate identity and access management a major threat to their cloud infrastructure. 85% of organizations said they plan to increase their security spending this year, with a significant portion being allocated to cloud infrastructure security.

D-Link Nuclias cloud-managed network solution optimizes business operations
2021-06-30 02:30

D-Link has introduced their latest Cloud-enabled SD-WAN Gateway and mobile apps to their Nuclias Cloud network management solution at Mobile World Congress in Barcelona, Spain. D-Link's Nuclias Cloud Networking Solution helps businesses resolve these issues and build the infrastructure needed to support a largely remote workforce while reducing cost, maximizing resources, and alleviating daily network management challenges.

Virtana Migrate accelerates cloud migration to AWS
2021-06-30 02:00

Virtana announces the momentum of Virtana Platform, with successful customer and partner use cases for its module, Virtana Migrate. The SaaS solution, with strategic partner Presidio, delivered cloud migration efficiency and cost optimization for a national insurance company, accelerating their move to Amazon Web Services by 70%. The Virtana Migrate module within Virtana Platform brought the insight this insurance company needed to rightsize, de-risk, and accelerate their migration.

Red Hat OpenShift 4.8 helps organizations accelerate the creation of new cloud-native applications
2021-06-30 01:30

Providing a powerful foundation to develop and connect diverse workloads across the hybrid cloud, Red Hat OpenShift 4.8 helps organizations accelerate the creation of new cloud-native applications without abandoning existing environments and IT investments. As new customer goals continue to create room for market innovation, Red Hat OpenShift 4.8 provides organizations a common foundation to more consistently develop, deploy and run a hybrid mix of applications and services.

You can hijack Google Cloud VMs using DHCP floods, says this guy, once the stars are aligned and...
2021-06-30 00:02

Google Compute Engine virtual machines can be hijacked and made to hand over root shell access via a cunning DHCP attack, according to security researcher Imre Rad. Though the weakness remains unpatched, there are some mitigating factors that diminish the potential risk. A successful attack involves overloading a victim's VM with DHCP traffic so that it ends up using a rogue attacker-controlled metadata server, which can be on the same network or on the other side of the internet.

Avaya OneCloud for Service Cloud empowers service agents with flexible migration options
2021-06-26 01:30

Avaya launched Avaya OneCloud for Service Cloud on Salesforce AppExchange, empowering customers to connect Avaya OneCloud to Salesforce Service Cloud, enabling AI and voice benefits that offer more customer service experiences. A new Service Cloud integration brings together voice, digital channels and customer insights into one central view for service agents.

Reduce Business Risk By Fixing 3 Critical Endpoint-to-Cloud Security Requirements
2021-06-24 08:52

Register for this upcoming webinar to learn how to reduce risk with integrated endpoint-to-cloud security. Currently, security from endpoints to the cloud involves multiple standalone tools that solve specific problems.