Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user.

IoT security essentials: Physical, network, software

Network World

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology. And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.

Microsoft admits Windows 10 disables third-party security software

Computer Weekly

Microsoft has admitted Windows 10 disables some third-party security software, but claims this is purely because of compatibility issues

Schneider Electric patches DCIM software security hole

Computer Weekly

Users of StrucxureWare datacentre monitoring software urged to upgrade to latest version after discovery of critical vulnerability by security researchers

3 Reasons Security Analytics Software Is Still Necessary in 2019

Galido

Information Technology Blog - - 3 Reasons Security Analytics Software Is Still Necessary in 2019 - Information Technology Blog. Yet, many enterprises still are operating with the mindset that security is a “big business” problem. . Security Software

Cisco pays $8.6M to settle security-software whistleblower lawsuit

Network World

million to settle claims it sold video security software that had a vulnerability that could have opened federal, state and local government agencies to hackers. Cisco has agreed to pay $8.6

Software for Business: A Buyer’s Guide

Galido

Information Technology Blog - - Software for Business: A Buyer’s Guide - Information Technology Blog. Look for software that has been tailored to your industry. Find out exactly how they are currently operating and think carefully about how software could help to improve this.

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

Antivirus software can help but it’s not invincible Image Credit: Gabriel Salvadó. Almost every person with the CIO job currently has some form of antivirus software deployed within their company. What’s The Value Of Antivirus Software?

Blackberry Acquires Security Software Maker Good Technology

Data Center Knowledge

Blackberry Enterprise Government SecurityBlackberry's smartphone business didn't succeed, but the acquisition of Good Technology positions the company to compete strongly in the enterprise mobility market. Read More.

Cisco Meraki ups security with new switch, software

Network World

Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources.

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures

How Your Product Team Can Integrate Security Throughout Software Development Lifecycles

CTOvision

Read Harshit Agarwal explain how you can integrate security throughout software development lifecycle on Information Security Buzz : Integrating security into DevOps to deliver DevSecOps is no easy task: It requires changing the team’s mindset, processes, and technology. Each company’s ultimate goal should be to keep DevOps collaborative and agile, which means making security silent […].

Understanding the Security Risks of New Cloud Software

CTOvision

Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. However, some concerns about cloud security risks appeared early in the industry and are still relevant today.

Australia’s security software spending sees growth spurt

Computer Weekly

Australian enterprises are increasingly investing in security software as the threats to data continue to multiply

Video Presentation on Abusing Software Defined Networks

CTOvision

See the video at this link and embedded below: Im a huge fan of Software Defined Networking (SDN) and so many other related applications of advanced enterprise tech. CTO Cyber Security Video software defined networking

Video 140

Cisco patches serious SD-WAN software security holes

Network World

Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow, arbitrary file override and privilege access weaknesses that could have led to denial-of-service attacks or access problems.

WAN 87

Successful SaaS Marketing Strategies for Software Companies

Galido

Information Technology Blog - - Successful SaaS Marketing Strategies for Software Companies - Information Technology Blog. The software sector is evolving. SaaS (Software as a Service) grows almost three times faster than Software as such, almost 20% annually.

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

National Security Software On Wall Street: Cognitio’s Roger Hockenberry Comments

CTOvision

The Wall Street Journal examined this trend in their piece titled: Spy Software Gets a Second Life on Wall Street. The article also provides a good tip of the hat to another of our favorite organizations in the national security ecosystem, In-Q-Tel.

Software-Defined Storage: Choices Ahead

Chuck's Blog - EMC

We’re going to see something very similar when it comes to software-defined storage.  Before long, we’ll see many dozens of software storage options, all conveniently self-labeled “software-defined storage”. This article is part of a series on software-defined storage.

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. The reality is that antivirus software that uses old fashioned methods of signature analysi. As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here).

Why Software-Defined Storage Matters

Chuck's Blog - EMC

At the same time, it appears that software is eating our world : extending the power of human intellect in ways that continually surprise us — now often powered by the avalanche of information we are creating about ourselves and the world around us. Software-Defined” — In One Word.

Cisco: 6 critical security alarms for UCS software, small-biz routers

Network World

Cisco today warned its Unified Computing System (UCS) customers about four critical fixes they need to make to stop nefarious agents from taking over or attacking their systems.The problems all have a severity rating of 9.8 out of 10 on the Common Vulnerability Scoring System ( CVSS ).

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. On the flip side, software as a service ( SaaS ) providers defaulted to totally open access. Identity is the foundation for all other security controls. Security

More reasons to put secure data in the public cloud

David Linthicum

The worldwide market for cloud intrusion protection software is projected to grow by $1.8 This should surprise no one, considering the amount of core business assets that are being pushed to the cloud now, as well as the amount that security providers are spending on cloud.

Making The Case For Software-Defined Storage

Chuck's Blog - EMC

My corner of the IT industry is foisting a new concept on enterprise IT shops: software-defined storage.  Maybe software-defined storage doesn’t solve an immediate, burning problem for you right now, but — over time — many IT organizations will hit an interesting wall.

Barclays Bank stops offering Kaspersky software to new users

Computer Weekly

Bank is no longer offering customers Kaspersky anti-virus software after UK security agency issues warning

Software Update Checker

Galido

Software vulnerabilities can expose you to attacks when you least expect. It’s important to keep your software up to date, not only to prevent open doors to your system, but to fix bugs and speed up performance as well. Fast Downloads of the Latest Software for Windows.

How To Get the Best User-Friendly Software Licensing Protection 

Galido

Information Technology Blog - - How To Get the Best User-Friendly Software Licensing Protection - Information Technology Blog. A dissatisfied customer can turn several other people off from your software, or worse. Quickly Put Your Software into Customers’ Hands. Softwar

Airbus confirms software errors/configuration brought down A400M transport plane

CTOvision

The Register is reporting that badly configured software, installed incorrectly, is responsible for the crash of an Airbus A400M transport plane. Engine control software, installed wrong, was to blame. For the initial report on the software see: The Register.

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Galido

Information Technology Blog - - Emulating USB Dongle – Introducing HASP Dongle Emulator Software - Information Technology Blog. In addition, it offers good protection against attempts to pirate the software. Software for USB key emulation. Hardware Software

Cyberattack on Medical Software Shows Industry Vulnerability

Data Center Knowledge

SecurityHospitals are among most frequently targeted, KPMG says; Nuance’s transcription service still affected weeks later Read More.

Security products are among the most vulnerability-riddled software products

Network World

Why do you spend the big bucks for security products? But many of the top security vendors utilize open-source or third-party components and libraries which are seemingly packed with vulnerabilities. While this is something you already know, a new report found that security products are some of the most vulnerable software. 11 of those software products overflowing with vulnerabilities were security-related products.

How Google’s Custom Security Chip Secures Servers at Boot

Data Center Knowledge

Software security tools are increasingly augmented with dedicated security processors Read More. Design Google Hardware Security

Google 147

BlackBag Technologies: Forensic software for analyzing Windows, Mac, iPhone, Android Devices

CTOvision

Blackbag has been developing innovative forensic acquisition & analysis software solutions for Windows, Android, Mac & iPhone since 2003. Cyber Threat Intelligence Security Companies