Topic: security

VMware and Carbon Black logos

VMware completes acquisition of cloud-native endpoint protection provider Carbon Black

VMware has officially acquired Carbon Black for $2.1 billion. The company first announced plans to take on the cloud-native endpoint protection provider at the end of August.  “Carbon Black brings us an industry-leading endpoint and workload security platform, with a cloud-native architecture, an AI-powered data lake and a smart, lightweight agent,” said Sanjay Poonen, chief … continue reading

Box and Splunk partner to provide enhanced threat detection capabilities

Cloud content management provider Box announced a new partnership to build integration between the “data-to-everything” platform provider Splunk and its security platform Box Shield. Box Shield is Box’s set of content security controls and advanced threat detection capabilities that is generally available this month. The controls are built natively into Box and designed to help … continue reading

Best practices for mitigating insider threats in the cloud

Although cloud vendors like Microsoft are generally responsible for protecting their infrastructures against attacks and even offer additional security services (e.g., the Microsoft 365 Security Center) to help customers with data protection, companies need their own controls as well. Why? Many different types of cloud users put corporate data at risk, including IT teams, managers … continue reading

Trend Micro introduces AI-powered email fraud detection feature

Cybersecurity company Trend Micro is trying to help companies better fight against identity fraud. Today, it released the latest version of its flagship security product, which includes a new AI-powered Fraud Buster feature that protects inboxes from scams and phishing attacks. According to Trend Micro, about 90 percent of the security threats it blocked in … continue reading

Puppet releases vulnerability remediation solution for IT Ops teams

Infrastructure automation and delivery provider Puppet is giving IT teams the ability to find, prioritize and remediate mission-critical vulnerabilities with the announcement of Puppet Remediate. The new vulnerability remediation solution aims to reduce the time it takes to detect vulnerabilities, and enable immediate action without agent technology on the vulnerable systems.  According to Forrester, 58 … continue reading

Nondescript hacker sitting in front of a laptop in a dark room

Protect Against Cyberattacks with a Digital Stoplight

Crime no longer is confined to seedy back alleys or only takes place during the dead of night; the internet has become a playground for cybercriminals who don’t have the constraints of time or location. Cybercrime has seen a significant increase in recent years, and along with that has come growing damage recovery costs. The … continue reading

IIC: How to manage and assess the trustworthiness of IIoT

The Industrial Internet Consortium (IIC) is releasing new recommendations and advice for the trustworthiness of the Industrial Internet of Things (IIoT). The organization details the importance of trustworthiness as well as how to measure, analyze and assess it in a new white paper, Managing and Assessing Trustworthiness for IIoT in Practice. RELATED CONTENT: IIC: Collaboration between … continue reading

ITOps Times news digest: Google Cloud acquires Chronicle, Expedient announces advanced DRaaS solution, and Juvare launches collaborative incident management solution

Google Cloud has announced that it is acquiring Chronicle, a security company also created by Alphabet. Google Cloud believes that this partnership will enable it to provide a comprehensive security portfolio that will benefit its customers. Chronicle offers several solutions that will be beneficial to Google Cloud, such as VirusTotal malware intelligence and Backstory investigation … continue reading

ITOps Times news digest: Aqua Security 4.2, Gravitational’s Teleport, and DH2i’s DxConnect

Aqua Security has announced the release of version 4.2 of its platform. This release introduces Vulnerability Shield, which is an automated vulnerability and component analysis tool. Vulnerability Shield can generate policies that will detect and block access to vulnerable components. Aqua 4.2 also includes advanced protection for serverless functions, container image scanning by layer, a … continue reading

ITOps Times news digest: Signal Sciences integrates with Cisco Threat Response, Red Hat Enterprise Linux 7.7 beta, and SentinelOne raises $120 million

Signal Sciences has announced a new integration with Cisco Threat Response in order to better help its customers defend against web app attacks. The integration will give customers instant visibility into their web application attack data, enabling security teams to respond to threats quickly. “In today’s evolving business landscape, we are seeing a dramatic shift … continue reading

Creating effective security with simulation technology

Sophisticated cyberattacks are proliferating globally. Today, with the expansion of the Internet of Things (IoT) and device connectivity, cyberattack targets extend  beyond defense and IT to critical infrastructure, aerospace, automotive, healthcare, heavy industry, transportation, and communications—virtually any segment in which there is digital information to steal or misuse,  or where there is potential for operational … continue reading

The Container Security Buyers Guide

The ITOps Times Container Security Buyers Guide features: Moving parts mean more complexity Containing App Vulnerabilities “Doomsday” flaw found in RunC underscores potential for critical container vulnerabilities 9 security best practices for Kubernetes you should be following A guide to container security tools … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!