Security News

Russian security shop Kaspersky has warned about the crew dubbed DeathStalker, which has new malware up for sale as a hacking-for-hire service. The DeathStalker team seems to make a target of legal and financial services companies and the new malware hides itself in images of pictures of ferns and peppers and uses a DNS over HTTPS to set up a channel to exfiltrate data.

Lenovo Data Center Group announces new end-to-end data management solutions allowing customers of all sizes to harness data more securely and efficiently, from edge to core to cloud, with a single set of tools and capabilities for a smarter way forward. "Customers continue to face challenges implementing a cohesive data management system to analyze and process data more efficiently," said Stuart McRae, Executive Director and General Manager, Storage at Lenovo Data Center Group.

CloudBees formally releases the first two modules of its Software Delivery Management solution: CloudBees Engineering Efficiency and CloudBees Feature Management. Software Delivery Management enables organizations to deliver higher quality software and better measure business outcomes from software development investments.

Pioneered by IBM Research scientists, the company is now offering quantum-safe cryptography support for key management and application transactions in IBM Cloud, making it the industry's most holistic quantum-safe cryptography approach to securing data available today. "As our reliance on data grows in the era of hybrid cloud and quantum computing capabilities advance, the need for data privacy is becoming even more critical. IBM now offers the most holistic quantum-safe approach to securing data available today and to help enterprises protect existing data and help protect against future threats," said Hillery Hunter, Vice President and Chief Technology Officer, IBM Cloud.

Third-party risk management professionals increasingly do not trust that security questionnaires provide sufficient information to properly understand and act on their third-party risk, according to RiskRecon and Cyentia Institute. As a result, the study found more enterprises are moving towards data-driven third-party risk management programs.

Cohesity announced the results of a survey of 500 IT decision makers in the United States that highlights critical IT and data management challenges midsize and enterprise organizations are facing as companies prepare for 2021. Some of these challenges came to light as companies answered questions about their appetite for Data Management as a Service.

ACI Worldwide announced that its ACI Fraud Management solution is now available as a fully certified private offering via the Microsoft Azure Marketplace. ACI Fraud Management delivers enterprise fraud management capabilities, including advanced machine learning, predictive analytics and expertly defined rules, to help banks and intermediaries identify and mitigate financial fraud and help reduce the compliance burden in all forms.

Red River unveiled a fully managed software-defined wide area network solution. Red River Managed SD-WAN leverages the company's award-winning Managed Services and Cisco SD-WAN technology to deliver advanced enterprise networking capabilities to the public sector and enterprise markets.

This integrated Druva solution brings customers the best of both technologies, including advanced data protection with sandbox management and data governance, delivered in the exact same way their CRM service is accessed - via a cloud-native SaaS platform. Druva, combined with sfApex, delivers comprehensive SaaS data protection and management for Salesforce with granular backup and data recovery as well as streamlined and automated migrations and improved tools for developers.

Security, an Israel-based company that has been developing an authorization policy management platform, emerged from stealth mode on Wednesday with $6 million in seed funding. Security's platform, which the company expects to become generally available in the second or third quarter of 2021, is described as an authorization policy management platform powered by the open source authorization engine Open Policy Agent, and it aims to help developers address the challenges associated with implementing role-based access controls and attribute-based access controls in enterprise applications.