Coralogix raises $25 million to parse software logs with AI

Venture Beast

Coralogix, which leverages AI and machine learning to parse software development logs, raised $25 million in venture capital financing. Read More.

Cisco software fortifies industrial IoT security

Network World

Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IoT security essentials: Physical, network, software

Network World

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology. And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.

How Your Product Team Can Integrate Security Throughout Software Development Lifecycles

CTOvision

Read Harshit Agarwal explain how you can integrate security throughout software development lifecycle on Information Security Buzz : Integrating security into DevOps to deliver DevSecOps is no easy task: It requires changing the team’s mindset, processes, and technology. Each company’s ultimate goal should be to keep DevOps collaborative and agile, which means making security silent […].

Devops 199

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. An analytics firm called ExtraHop examined the networks of its customers and found that their security and analytic software was quietly uploading information to servers outside of the customer's network. Back when this blog was dedicated to all things Microsoft I routinely railed against the spying aspects of Windows 10.

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola.

Top Actions From Gartner Hype Cycle for Cloud Security, 2020

CEB IT

Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. The reality is that antivirus software that uses old fashioned methods of signature analysi. As a technologist I have long respected Symantec and their many capabilities (they do far more than antivirus, see the list here).

Understanding the Security Risks of New Cloud Software

CTOvision

Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. However, some concerns about cloud security risks appeared early in the industry and are still relevant today. Both providers and customers must ensure that all data transfers occur over secure channels. Carol M. Evenson.

Video Presentation on Abusing Software Defined Networks

CTOvision

See the video at this link and embedded below: Im a huge fan of Software Defined Networking (SDN) and so many other related applications of advanced enterprise tech. CTO Cyber Security Video software defined networkingBut watching this video is giving me pause. It very clearly shows that current SDN implementations are full of weaknesses that could shift the SDN Utopia into a nightmare.

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

Microsoft admits Windows 10 disables third-party security software

Computer Weekly

Microsoft has admitted Windows 10 disables some third-party security software, but claims this is purely because of compatibility issues

Top 10 antivirus software options for security-conscious users

Tech Republic Security

The world is too dangerous to use the internet unprotected. Save your computers, tablets, and phones from being attacked with these options

Schneider Electric patches DCIM software security hole

Computer Weekly

Users of StrucxureWare datacentre monitoring software urged to upgrade to latest version after discovery of critical vulnerability by security researchers

Security at the network edge: Inside software-defined networking and Kubernetes

Tech Republic Data Center

Security concerns remain prominent across all network environments, with some unique to the network edge, SDN, and other services. Get some tips from industry insiders

Cisco Meraki ups security with new switch, software

Network World

Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources.

Cisco security warnings include firewall holes, Nexus software weaknesses

Network World

Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS), Unified Computing System (UCS) software and Nexus switch operating system (NX-OS). Network pros react to new Cisco certification curriculum. The firewall and UCS vulnerabilities all have a severity level of “high” on the Common Vulnerability Scoring System and include: To read this article in full, please click here

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. While this approach is initially more work, it ultimately provides a more secure network and is easier than coming back and closing up all the holes. Ubiquity is a very important concept in security. Nathaniel Crocker.

National Security Software On Wall Street: Cognitio’s Roger Hockenberry Comments

CTOvision

The Wall Street Journal examined this trend in their piece titled: Spy Software Gets a Second Life on Wall Street. The technology challenges in the national security community frequently require exceptional solutions, and many of those solutions can be leveraged in other sectors of the economy, including the finance world. The article also provides a good tip of the hat to another of our favorite organizations in the national security ecosystem, In-Q-Tel.

How software-defined networking can secure critical systems

Computer Weekly

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security

3 Reasons Security Analytics Software Is Still Necessary in 2019

Galido

Information Technology Blog - - 3 Reasons Security Analytics Software Is Still Necessary in 2019 - Information Technology Blog. Yet, many enterprises still are operating with the mindset that security is a “big business” problem. . As our data becomes more and more sophisticated, so should our security software and the tools we use to understand the effectiveness of this software. In a perfect world nothing would even get through your security measures.

Billions of devices vulnerable to new ‘BLESA’ Bluetooth security flaw

CTOvision

Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer. Named BLESA (Bluetooth Low Energy Spoofing […].

Energy 183

Airbus confirms software errors/configuration brought down A400M transport plane

CTOvision

The Register is reporting that badly configured software, installed incorrectly, is responsible for the crash of an Airbus A400M transport plane. Engine control software, installed wrong, was to blame. For the initial report on the software see: The Register. The post Airbus confirms software errors/configuration brought down A400M transport plane appeared first on CTOvision.com. CTO Cyber Security DoD and IC News Airbus Airbus A400M Atlas San Pablo Airport

Enterprise Security and Functionality Benefits of the new Software Defined Perimeter (SDP) Approach

CTOvision

But the erosion of the network perimeter is making traditional security a roadblock to efficiency. No one wants to allow holes to be poked in the security system but no one wants to shut down connectivity to partners either. The Software Defined Perimeter uses software techniques to render the internal environment invisible to all outsiders, unless trust is granted. Secure connectivity is provided only to trusted users and devices. Bob Gourley.

Best remote desktop software

TechnoBezz

Remote desktop software is a program that assists in having remote reach and control of other computers. The software performs one common role in that they offer remote control but independently they all have features that distinguish them from each other. Best remote desktop software.

Cisco patches serious SD-WAN software security holes

Network World

Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow, arbitrary file override and privilege access weaknesses that could have led to denial-of-service attacks or access problems.

WAN 117

Set Up a Budget-Friendly Application Security Program

CEB IT

In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 From healthcare institutions to tech, software, social media and meal delivery companies, cybercriminals have targeted every industry, stealing billions of records. In contrast to common perception, app security testing doesn’t always have to be a heavy investment. Read more: How Security and Risk Leaders Can Prepare for Reduced Budgets.

Budget 184

Blackberry Acquires Security Software Maker Good Technology

Data Center Knowledge

Blackberry Enterprise Government SecurityBlackberry's smartphone business didn't succeed, but the acquisition of Good Technology positions the company to compete strongly in the enterprise mobility market. Read More.

Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity

Tech Republic Security

How to use shadow IT discovery in Microsoft Cloud App Security to help remote workers stay secure and save bandwidth

How To 122

Google: Software is never going to be able to fix Spectre-type bugs

CTOvision

Researchers from Google investigating the scope and impact of the Spectre attack have published a paper asserting that Spectre-like vulnerabilities are likely to be a continued feature of processors and, further, that software-based techniques for protecting against them will impose a high-performance cost. And whatever the cost, the researchers continue, the software will be inadequate—some […]. Cyber Security News

Cisco pays $8.6M to settle security-software whistleblower lawsuit

Network World

million to settle claims it sold video security software that had a vulnerability that could have opened federal, state and local government agencies to hackers. According to Cisco, the software, which was sold between 2008 and 2014 was created by Broadware, a company Cisco bought in 2007 for its surveillance video technology and ultimately named it Video Surveillance Manager. Cisco has agreed to pay $8.6

How to Secure Your Kubernetes Deployments

CTOvision

Read Gadi Naor’s article about securing your Kubernetes deployments against cyberattacks on Dark Reading : At a time when almost every company is to some degree a software company, digital transformation and cloud adoption are not just strategic but critical to enterprise success.

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets. “Take preemptive steps to ensure the resiliency and security of your organization’s operations as attackers seek to exploit human nature and nonstandard operating modes.”

3 Software Programs That Let Businesses Monitor Employees’ Computers

CTOvision

Perhaps you’ve decided to emphasize productivity more than ever in your workplace and want to know whether it’s legal to use software that tracks how employees use their computers. CTO Cyber Security Cyber Threats News Security CompaniesBelow, we’ll investigate the laws surrounding that issue and why you might want to see what employees do — or fail to do — as well […].

Software for Business: A Buyer’s Guide

Galido

Information Technology Blog - - Software for Business: A Buyer’s Guide - Information Technology Blog. Look for software that has been tailored to your industry. Find out exactly how they are currently operating and think carefully about how software could help to improve this.

The Linux Foundation announces collective to enhance open source software security

Tech Republic Security

The newly formed Open Source Security Foundation includes titans in technology such as Google, Intel, Microsoft, IBM, and more

Australia’s security software spending sees growth spurt

Computer Weekly

Australian enterprises are increasingly investing in security software as the threats to data continue to multiply

Security products are among the most vulnerability-riddled software products

Network World

Why do you spend the big bucks for security products? But many of the top security vendors utilize open-source or third-party components and libraries which are seemingly packed with vulnerabilities. While this is something you already know, a new report found that security products are some of the most vulnerable software. 11 of those software products overflowing with vulnerabilities were security-related products.

Cobalt raises $29 million to bring its ‘pentest as a service’ platform to more software teams

Venture Beast

Cobalt.io, a "pentest-as-a-service" platform that lets any business access ethical hackers to stress-test their software, has raised $29 million. Business Dev Enterprise Mobile Security Cobalt.io

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. On the flip side, software as a service ( SaaS ) providers defaulted to totally open access. Identity is the foundation for all other security controls. Security

Scale and Speed with Cyber Security

CTOvision

Dealing with the scale that the internet can deliver, has unfortunately left us with a series of other non-optimal cyber security approaches and solutions. Out of all the problems to deal with subverting bureaucracy to enable security scaling is the hardest. Secondly, automation: every process that deals with software must be ruthlessly automated (i.e., “Sometimes quantity has a quality all its own” attributed to Stalin & Clausewitz.