Security News

Evertech replaces its IP Address Management platform with FusionLayer Infinity
2020-01-16 01:30

FusionLayer announced that Evertech has replaced its traditional IP Address Management platform with FusionLayer Infinity, the software-defined IPAM solution designed to simplify network automation for cloud-native service provider platforms utilizing containers. Evertech selected the FusionLayer solution to replace its traditional IPAM platform from FusionLayer it had been running for more than five years.

Perfect Sense unveils Gyro to simplify cloud infrastructure management
2020-01-15 02:30

Perfect Sense, which leverages its Brightspot publishing platform to drive innovations in web and mobile development, launched Gyro - a powerful cloud management tool that mitigates the risks associated with manually provisioning and managing infrastructure, lack of standards in configurations, and unpredictable results from changes to cloud infrastructure. Gyro dramatically improves DevOps productivity by allowing users to manage and maintain infrastructure using its simple, logic-ready configuration language, built for the cloud.

A 101 guide to mobile device management
2020-01-14 06:40

A mobile device management solution provides similar features that you would expect a systems management solution would use to manage PCs. However, mobile devices are not network-connected in the same manner as PCs, so a solution for mobile device management must rethink communications. The basic components of a mobile device management solution would consist of a server and an agent which would communicate with each other in order to complete commands and tasks.

Download: Security for Management PPT template
2020-01-14 04:30

To address this need, Cynet introduces the Security for Management PPT template: a tool to capture and sustain management mindshare and drive their understanding and commitment. The PPT template follows the commonly accepted NIST Cyber Security Framework as an overall outline and includes open sections which are to be completed in respect to each organization's unique security state.

Actiontec Optim Advanced Analytics: Proactive home networks management for providers
2020-01-08 01:30

Actiontec Electronics has expanded its award-winning Optim Managed Service Assurance Platform, launching a suite of analytics tools and services that enable service providers to optimize their customer's home Wi-Fi networks and broadband experience. Optim Advanced Analytics makes it easy and cost-effective for providers to proactively identify and resolve common problems in the home network including poor coverage, router configuration issues, and network congestion.

It's Time for the C Suite and Boards to Truly Engage in Third-Party Cyber Risk Management
2020-01-02 16:19

Their lack of voice is then compounded by the fact that most boards and C suites assume their IT and security teams have their cybersecurity covered. With the increasing incidence of cyber breaches and cyber regulations, this assumption is going to put the board and c suite in hot water.

The Promise and Reality of AI and ML in Security Management
2019-12-23 18:18

Dena Bauckman of ZixCorp Helps Separate Signal from NoiseAI and ML are often described inaccurately for their role in threat mitigation. Dena Bauckman of ZixCorp explains where the technologies...

Ransomware Risk Management: 11 Essential Steps
2019-12-18 21:48

Tips From a Cybersecurity Veteran on Winning the BattleIn this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up...

Jeff Bak joins Syniverse as VP of Product Management for cloud messaging services
2019-12-17 00:00

Syniverse, the world’s most connected company, announced it has appointed industry veteran Jeff Bak as Vice President of Product Management for its cloud messaging services. Bak has a proven track...

The importance of proactive patch management
2019-12-13 06:35

IT teams appreciate it when vendors or security researchers discover new vulnerabilities and develop patches for them. So do attackers. The same information that lets IT teams know where they may...