Security News

C2A Security announced the launch of its flagship cybersecurity product, AutoSec, a cybersecurity lifecycle management platform. For the first time in the automotive industry, AutoSec harmonizes communication among all the players down the supply chain, creating a uniform and effective channel for risk management that maintains in-vehicle cybersecurity throughout the vehicle lifecycle.

Virtustream announced xStreamCare Services for Security and Compliance, bringing together advanced security management and monitoring, expert consulting services, and its innovative Trust Platform - a unified, security and compliance management platform. Virtustream's latest security solutions provide near real-time visibility into security alerts, intrusion attempts, open vulnerabilities, log analytics, policy management and entitlements across Virtustream's Enterprise Cloud and Healthcare Cloud platforms, enabling enterprises to achieve a more proactive security posture to protect their business' IT assets, applications and data.

The author starts off by explaining vulnerability management basics, the importance of knowing your network and the process of collecting and analyzing data. He explains the importance of a vulnerability scanner and why it is essential to configure and deploy it correctly, since it gives valuable infromation to successfully complete a vulnerabilty management process.

Morpheus Data released the next major version of its hybrid cloud management platform which expands access to self-service IT, simplifies cross-cloud cost management, and accelerates integration into enterprise environments. Morpheus is recognized as a Leader in Gartner's Magic Quadrant for Cloud Management Platforms with the highest critical capability scores in three key use cases.

The CISO’s Guide to Third-Party Security Management provides the instructions you need to make your organization’s third-party security program effective and scalable. In particular, it covers how...

The problem is that even with the built-in security controls, organizations still experience security breaches due to misconfigurations in their SaaS applications. Cloud Access Security Brokers address security issues in SaaS applications.

Twilio announced a major expansion of the company's IoT offerings with the launch of Microvisor, an IoT connectivity and device management platform that offers embedded developers a one stop shop for building connected devices, keeping them secure, and managing them through their lifetime. Twilio aims to significantly accelerate IoT adoption by providing as much critical but common infrastructure as possible, so that IoT teams can focus on delivering unique value to businesses and consumers.

"An influx of data from multiple tools, coupled with low levels of automation, can have a paralyzing effect on IT incident management processes," said Jen Garofalo, IDG's Research Director. "More than 40% of respondents indicate IT incident remediation is handled with a mix of manual and automated processes, while another 20% report these processes are mostly manual."

With the new NETGEAR Insight Managed Business Router, these remote employees will simply need a BR200 in their home or remote office to connect to another BR200 in the main office and be able to access data residing on their office network securely. Designed specifically to enable businesses to instantly protect their networks with a secure site-2-site VPN and firewall rapidly and cost-effectively through the Insight Cloud Portal or mobile app, the Insight Managed Business Router comes with easy setup, firewall, VLAN management, and remote cloud monitoring and management from anywhere.

The research found that comparatively, across the Incident Management Spectrum, only the most advanced organizations have isolated keys to success across business and incident management functions. To assess the efficacy of incident management in organizations, the State of Automation in Incident Management analyzed components of a comprehensive incident management practice and how organizations detect, resolve and learn about incidents.