JASK: Modernizing security operations via an Autonomous Security Operations Center

CTOvision

Driven by AI and ML, the JASK autonomous security operations center (ASOC) platform frees analysts to become proactive threat investigators and responders. We believe the JASK approach is exactly what is needed in the continual struggle to automate security response.

White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

Alert Logic: Cloud Security as a Service

CTOvision

Alert Logic is widely known as an a provider of managed security services which can provide continuous monitoring and response managed by experts for firms using cloud, on-prem or hybrid architectures. Managed Services, Outsourced Security Alert Logic

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

BluVector: Revolutionizing network security with state-of-the-art AI

CTOvision

BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world's most sophisticated threats in real time. The BluVector team brings deep experience, including work in sensitive national security missions for the US Intelligence Community.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Garrison: Secure Web Browsing

CTOvision

With this post, we are initializing our coverage of Garrison Technology, a revolutionary provider of ultra-secure web browsing. Internet access for government employees presents one of the gravest threats to enterprise cyber security today. Company CTO Cyber Security News Security CompaniesCompromises on federal networks via spear phishing, watering hole attacks and drive-by-downloads permits cyber attackers ranging from criminals to nation states […].

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 InfoSec casinos infosec security awarenessmillion worth of chips was stolen online in 2011 Cyber-attacks are expected to cost global businesses $2 trillion by 2019 Software called NORA has been developed to prevent cyber attacks Phishing is a popular way of scamming casino players There’s no […].

Strategies for Securing Nonprofit Networks

Doctor Chaos

Nonprofits often think about how to attract more volunteers or achieve a greater reach with their fundraising initiatives. However, getting targeted by cybercriminals is a possibility that may not come up for discussion.

Recovering From a Security Breach

CTOvision

There are few things more unsettling for a company than being the victim of a security breach. If you’re looking to recover from your own security breach, it’s best to keep the following tips in mind. Cyber Security Cyber Threats NewsRick Delgado.

How to get the most cloud security

David Linthicum

Infact, you can reduce your risk more this way than with just the use of modern cloud security software and best security practices. Unfortunately, most companies just try to toss technology at security problems. Even when they do an amazing job locking up their cloud-based systems, they still run a high risk because staffers are now the biggest security hole, and the only way to plug that hole is through training.

How To 165

How to secure SaaS: Understanding the cloud’s security layers

David Linthicum

When you address security in the cloud for your enterprise use, you need to think of it in several layers: To read this article in full, please click here (Insider Story

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

“That’s Not My Job”: I&O’s Role Shift When It Comes To Security

Forrester IT

infrastructure & operations security & risk security analytics security automation & orchestration zero trust Automation Security & RiskIn the halcyon days of my sysadmin youth, my team was asked to perform entitlement reviews on sensitive systems. When we were asked to determine who should have access to what, my director responded in a way I would never forget: “That’s not my job.” ” It sounds snarky, but he was correct.

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance. application security.

How Google’s Custom Security Chip Secures Servers at Boot

Data Center Knowledge

Software security tools are increasingly augmented with dedicated security processors Read More. Design Google Hardware Security

Google 147

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas

CTOvision

Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Junaid Islam.

Cyber security requires man and machine, says F-Secure

Computer Weekly

Like other cyber security firms, Finland’s F-Secure is building an artificial intelligence capability into its products and services, but says this is no replacement for cyber security professionals

FedCloud Security Roadmap for 2018

CTOvision

As the Government continues to migrate to the cloud it becomes critical to integrate stronger security into its operations. Cloud and data security must go together. While cloud computing provides valuable IT architectures and solutions for government agencies, it also requires them to relinquish data security to public cloud service providers. Cloud Computing Cyber Security QuintessenceLabs

Intel makes security-first pledge

Computer Weekly

As it scrambles to deal with the Meltdown and Spectre processor exploits, Intel has made a series of security commitments

Intel 156

Connected Devices, Remote Security: Data Encryption and Security in the Cloud

CTOvision

Security” used to mean worrying about HTTPS certificates on your websites. Cloud Computing CTO Cyber Security NewsThe notion of a “device” was a browser and all you really had to do was to guarantee that traffic between it and your web servers was encrypted. Then the “bring your own device” (BYOD) phenomenon caused system administrators to worry about things like […].

F-Secure highlights another critical Intel security issue

Computer Weekly

As Intel scrambles to issue security updates to address the Meltdown and Spectre exploits, researchers have highlighted another, unrelated, critical security issue that could affect millions of corporate laptops

Intel 147

Intel Security shifts channel strategy

Computer Weekly

Intel Security adjusts its channel strategy in response to a market shift towards services-based security

Intel 176

BlackBerry launches cyber security services

Computer Weekly

BlackBerry has launched cyber security services to safeguard people, privacy and assets, with vehicle security and GDPR compliance leading the new offering

Security Think Tank: Cyber security is everyone’s responsibility

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses

Centralized security in the cloud is the best security model

David Linthicum

You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. The alternative is not good—meaning that you had no idea of the DDOS attack, and now you’re playing cloud security whack-a-mole to fend off the attack until you can put more permanent solutions in place. It’s 6:00 a.m. on a Monday morning.

Security Think Tank: Security analytics can provide serious value

Computer Weekly

What are the main challenges that security analytics can be used to address

Dedrone: Leading provider in airspace security

CTOvision

Dedrone is the leading provider in airspace security. They are attracting lots of attention in the security community, as well as from investors. Company Robotics Companies Security Companies