Category: security

Spinnaker Support Releases Enhanced Security Solution for Customers that Run Oracle and SAP

Spinnaker Support, a leading global provider of Oracle and SAP third-party support services, announced the release of its updated security and vulnerability management solution, now featuring seven-point protection for data, applications, and surrounding technologies. The updated security solution, which applies from initial onboarding and throughout the support lifecycle, now includes a virtual patching tool, powered by McAfee, that offers additional protection for customers’ databases.

Continue reading “Spinnaker Support Releases Enhanced Security Solution for Customers that Run Oracle and SAP”

Companies fear their cloud computing isn’t keeping up with security

Moving too fast means leaving too many doors open, organisations fear.

(Image credit: Image source: Shutterstock/faithie)

Businesses are moving to the cloud faster than they’d like to, new reports say, suggesting that with lagging security, trouble comes twice as fast.

Cybersecurity firm Symantec has recently polled 1,250 security decision makers across the world and concluded that more than half of all enterprise compute workload already migrated to the cloud. However, the majority agrees that security practices aren’t keeping the pace and they fear what might be the consequence.

Continue reading “Companies fear their cloud computing isn’t keeping up with security”

Cloud Security Alliance Releases New Threat List

Cloud Security Alliance has unveiled its Top Threats to Cloud Computing: Egregious Elevenreport, which lists the top 11 cybersecurity problems facing cloud computing users. It is the first major update to the list since 2016, when Alliance released the Treacherous 12, although it has released reports taking a deep dive into the threats with case studies in the interim.

Data breaches still top the list, unmoved since 2016. Other perennial threats remaining on the list from last time are poor identity management, insecure APIs, account hijacking, insider threats and the abuse and nefarious use of cloud services.

That leaves room for five new threats.

 

Continue reading “Cloud Security Alliance Releases New Threat List”

neXenio Joins Cloud Security Alliance

neXenio GmbH today announced that it has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

neXenio GmbH today announced that it has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

Continue reading “neXenio Joins Cloud Security Alliance”

Indegy Launches Industrial Cybersecurity-as-a-Service Offering

Indegy on Thursday announced the general availability of CIRRUS, a new industrial cybersecurity-as-a-service (ICSaaS) offering.

CIRRUS is designed to help organizations of all sizes monitor and protect their operational technology (OT) environments using cloud technologies and real-time threat intelligence sharing.

Indegy

Indegy CIRRUS combines four applications: Live Feed, which provides real-time updates on vulnerabilities and other high-risk threats; Enterprise Manager, which centralizes management and visibility for distributed environments; ICS Cloud Collaboration, which collects and correlates anonymous threat data from Indegy customers; and Device Integrity, which provides full security coverage via active detection technology.

Continue reading “Indegy Launches Industrial Cybersecurity-as-a-Service Offering”

Contrast Security Launches Next Generation Open Source Software Security Platform for DevOps

Contrast Security, the pioneer in enabling “self-protecting” software by embedding vulnerability analysis and exploit prevention directly into modern software, continues to re-invent application security with the launch of Contrast OSS. Contrast OSS is offered as a solution to help organizations building modern software solve the security, legal and compliance risks associated with their use of open source software (OSS).

According to a recent RedHat report, 99% of IT leaders in surveyed enterprises see adoption of open source software as important for their organization, and a majority of organizations plan to increase their use of open source over the next 12 months. As companies around the world rely more on leveraging open source software, there is also a growing understanding of the risks that come with it. First generation tools used by these organizations to assess open source components struggle to provide effective security analysis and are not keeping up with high-velocity software development. These scan-based tools do not produce the accurate and actionable insight teams need to pinpoint true risks and quickly eliminate those risks early in the development phase. Moreover, legacy tools do not provide protection against attempts to exploit open source vulnerabilities in production applications. This leaves companies exposed to evolving threats, with poor visibility into the real risks introduced by these components.

Continue reading “Contrast Security Launches Next Generation Open Source Software Security Platform for DevOps”

Morphean Platform Unlocks the Intelligence in Cloud-based Access Control

VSaaS innovator extends product suite to go beyond video security and enable Access Control-as-a-Service (ACaaS) through European technology partnership with SimonsVoss

FRIBOURG, SwitzerlandJune 13, 2019 /PRNewswire/ — SimonsVoss Technologies GmbH, part of the Allegion group – a global leader in digital locking and physical access control systems – has entered a technology partnership in Europewith Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego[1], extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024[2].

Continue reading “Morphean Platform Unlocks the Intelligence in Cloud-based Access Control”

Cyber-Security im KI-Zeitalter: Ein gutes Unternehmen ist ein wackeliges Unternehmen

Thorsten Jochim

Hackerangriffe bereiten Unternehmen schon heute große Bauchschmerzen. Der Global Risk Report des World Economic Forum untermauert diesen Zustand: Er benennt Cyber-Angriffe als eine der größten Gefahren für unseren Wohlstand. Zeit, sich zu rüsten? Nein. Zeit, sich einzustellen. Angriffe sind unvermeidbar.

Um ein Unternehmen online anzugreifen, benötigt es nicht sonderlich viel Expertise. Schwachstellen lassen sich in der Regel leicht und teilweise automatisiert identifizieren und ausnutzen. Allein, weil in vielen Unternehmen oft die einfachsten Sicherheitsmaßnahmen keine Anwendung finden. Letztere Annahme gilt insbesondere für den Mittelstand, weil dort sowohl Wissen als auch Ressourcen fehlen, sich gegen Hacker-Angriffe zu wehren. Aber auch große Unternehmen geraten andauernd in das Visier von Cyber-Kriminellen. Aus der- artigen Angriffsmanövern hat sich inzwischen ein florierendes Geschäftsmodell entwickelt. Im Unter- schied zum Mittelstand sind sich große Unternehmen indes bewusst, welche Risiken von Hackern ausgehen: Sie investieren hohe Beträge in die Abwehr von Cyber-Angriffen, unter anderem auch in den Einsatz von Machine Learning und Künstlicher Intelligenz.

 

Continue reading “Cyber-Security im KI-Zeitalter: Ein gutes Unternehmen ist ein wackeliges Unternehmen”

EonStor GSc: die Geheimwaffe für Unternehmen zur gemeinsamen Cloud-Dateinutzung

Infortrend® Technology, Inc. (TWSE: 2495) präsentiert heute die Geheimwaffe zur gemeinsamen Cloud-Dateinutzung von Unternehmen – EonStor GSc Hybrid Cloud Storage Appliance.

Was macht gemeinsame Cloud-Dateinutzung zu einem unerlässlichen Instrument für das Datenmanagement? Die gemeinsame Nutzung von Dateien in der Cloud bietet den einfachsten Zugang, wenn es um das Speichern und den Austausch von Dateien zu jeder Zeit und von jedem Ort geht. In der Kurzform einfach als Cloud bekannt bietet dieses Konzept einen flexiblen Ausbau der Kapazitäten und niedrigere Einrichtungskosten für Unternehmen.

Continue reading “EonStor GSc: die Geheimwaffe für Unternehmen zur gemeinsamen Cloud-Dateinutzung”

Die 7 wichtigsten Trends in der IT-Sicherheit im Jahr 2019

Technologien wie künstliche Intelligenz oder das Internet of Things eröffnen neue Angriffsflächen für Angreifer – aber auch neue Wege zur Verteidigung.

Nicht zuletzt die Diskussion um den vermeintlichen Hackerangriff auf Politiker und Prominente in der vergangenen Woche hat einmal mehr ein Schlaglicht darauf geworfen, wie verwundbar die Systeme in einer immer stärker vernetzteren Welt sind – und dass wir alle gefordert sind, uns viel stärker als bisher auch um funktionierende Sicherheitslösungen und Passwörter kümmern zu müssen.

Continue reading “Die 7 wichtigsten Trends in der IT-Sicherheit im Jahr 2019”