Security News
Qualys announced the immediate availability of Qualys Multi-Vector EDR. Taking a new multi-vector approach to Endpoint Detection and Response, Qualys now brings the unified power of its highly scalable cloud platform to EDR. "Qualys Multi-Vector EDR provides our Infosec team with actionable visibility into our endpoints in terms of detecting malicious hashes provided by intelligent agencies as well as detecting potential malicious attacks through authorized processes, to keep our company assets secure." "Unfortunately, not all organizations have such a focus. Nevertheless, weaving in threat intelligence enables Qualys to combine in-house context and vulnerability management-driven prioritization with external context, representing an opportunity to achieve something greater than the majority of the market to date," said Mark Child, research manager, European Security, IDC. "We are proud to deliver Multi-Vector EDR to customers and extend into the detection and response market," said Philippe Courtot, chairman and CEO of Qualys.
Stellar Cyber announced a new toolkit customers can use to verify the platform's functionality by launching a wide variety of cyberattacks against it. The Red Team toolkit is an offensive attack generator that 'red team' security analysts can use to test the Stellar Cyber Open-XDR platform's ability to defend against the latest attacks.
According to the just-released 2020 State of Security Operations survey of 314 enterprise security professionals, enterprise security teams around the world feel that they struggle with the growing pace, volume and sophistication of cyberattacks. Thanks to manual triage processes and disparate and legacy security tools permeating most environments, 28 percent of alerts are simply never addressed, the survey, released Thursday, found.
Flowmon Networks announced the general availability of Flowmon ADS 11. The latest version brings superior UX, massive performance increase, noise-free incident understanding, and reporting across all environments to help security teams to reduce manual workloads without sacrificing control.
Coder announced the availability of its latest version of Coder Enterprise, the platform for software development. Coder Enterprise automates the time-consuming, manual processes involved in creating and configuring development environments and enables engineers to work from anywhere and focus on writing code.
To improve organizational security postures in this new hybrid network environment, Security Operations and Network Operations teams are becoming fast friends. Gartner has recently changed the name of one of their market segments from "Network Traffic Analysis" to "Network Detection and Response" to reflect the shift in demand for more security-focused network analysis solutions.
This has been intensified by the pandemic, with security teams stretched to breaking point trying to secure new remote working regimes against the influx of opportunistic cyberattacks. There is a human cost to this high-pressure environment and new research from SIRP shows that the additional burdens placed on security operations center teams due to COVID-19 has affected staff churn rates.
A former Cisco Systems employee pleaded guilty this week to hacking into the networking company's cloud infrastructure and deleting 16,000 Webex Teams accounts in 2018. Webex Teams is Cisco's collaboration application for enterprises.
Which works to detect and compare configuration changes to servers, databases, and applications, now integrates a policy compliance engine aimed at helping IT teams simplify and more efficiently achieve compliance and compliance reporting, with an initial focus on the federal space. By integrating a policy compliance engine focused on select STIG policies, makes it easier for federal IT pros to automatically check systems and applications for STIG compliance, deliver clear and quick compliance results for auditing purposes, and identify non-compliant elements for more efficient remediation.
New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises. Many companies use the 'purple team' approach, in which the red and blue teams come from their own staff and work together to determine security preparedness.