Inside Advanced Scale Challenges|Wednesday, January 25, 2017
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Google Expands Cloud Encryption Options

Google Expands Cloud Encryption Options

Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its ...

Machine Learning and Online Security in 2017

Machine Learning and Online Security in 2017

As companies increase their digital footprints, ‘identify and diagnose’ capabilities will not defend against the growing array ...

How Retailers Can Fend Off FlokiBot Malware

How Retailers Can Fend Off FlokiBot Malware

The holiday shopping season is upon us, and with increased retail activity there is a corresponding increase ...

Forecast: Hackers Target Software-Based Nets

Forecast: Hackers Target Software-Based Nets

Among the growing list of security threats expected to expand in the coming year are hackers probing ...

Security

January 17, 2017(0)
Threat actors are getting better, faster, and more efficient at compromising networks, taking only minutes or less to breach systems. Unfortunately, organizations are taking weeks, if not longer, to discover these breaches. In fact, over the last decade the “detection deficit” – the time it takes adversaries to compromise networks vs. the time it takes those organizations to discover ... Full article
January 11, 2017(0)
Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The Cloud Key Management Service is intended to broaden encryption options on the Google Cloud Platform as the shift to multi-tenant cloud services expands. Google (NASDAQ: GOOGL) said Wednesday (Jan. 11) ... Full article
December 9, 2016(0)
Securing the contents of application containers based on Docker and other platforms has relied heavily on isolating individual containers from one another along with other access control approaches. Now, a data security vendor is proposing an encryption scheme that, for example, extends "data-at-rest" security capabilities to Docker encryption and those access controls. Cyber and data security specialist Thales on ... Full article
December 7, 2016(1)
A flurry of industry surveys have flagged open source and unlicensed software as growing security threats. Moreover, a review released by Flexera Software also found that the very security products designed to protect IT infrastructure are themselves riddled with vulnerabilities embedded in open source software. While agreeing that malware is a growing threat, other observers counter that the culprit ... Full article
November 17, 2016(0)
The steady shift toward purchasing IT "as a service" is accelerating the decentralization of infrastructure management, fostering growing security concerns as more enterprises shift operations to the cloud, according to study commissioned by VMware Inc. The company (NYSE: VMW) pointed to growing concerns about IT fragmentation and the resulting security gaps to pitch its "cross-cloud architecture" designed to help ... Full article
October 28, 2016(0)
As enterprises seek ways to nail down IT security for a growing list of open-source infrastructure distributions, the security sector is moving toward critical mass with an increasing number of acquisitions. This week's deal between software license optimization vendor Flexera Software and security and compliance specialist Palamida Inc. was followed by the acquisition of an application container security startup ... Full article
October 27, 2016(0)
Seeking to spot potential security vulnerabilities in systems that increasingly rely on open source software, software license optimization vendor Flexera Software has acquired a specialist in identifying potentially vulnerable software components. Flexera, Itasca, Ill., said Thursday (Oct. 27) it is acquiring San Francisco-based Palamida Inc. Terms of the transaction were not disclosed. The deal represents an expansion of Flexera's ... Full article
October 12, 2016(0)
Security remains the greatest barrier to cloud adoption as more mobile applications are hosted by outside software and infrastructure service providers, according to a new survey. The vendor poll released this week also found that only 10 percent of cloud migrations have been completed as enterprises struggle with a host of security issues. The digital transformation survey released Wednesday ... Full article
October 11, 2016(0)
U.S. government agencies' slog to the cloud, a journey that has lately been complicated by a new set of security requirements designed to fend off an outbreak of "nation-state" cyber attacks, registered some modest progress this week when another cloud services provider announced it had achieved "ready status" under a federal cloud security initiative. CloudPassage Inc., a security platform ... Full article
September 28, 2016(0)
As more data, enterprise applications and other workloads move to public clouds, greater attention and investment are going into cloud security as a way to protect data while managing information and cloud services. Those services in particular are attracting investment capital. Among the latest startups to reap that windfall is cloud data protection startup Druva Inc., which on Wednesday ... Full article
September 22, 2016(0)
As more data and enterprise applications are moved to public cloud services, a surprisingly high number of enterprises responding to a new cloud security survey said they are not encrypting their data and other cloud workloads. The cloud adoption survey of more than 400 executives spanning a variety of industries who attended the recent VMworld conference found that 28 ... Full article
September 19, 2016(2)
The brick and mortar of an industrial Internet of Things is arriving with a security framework designed to balance the safety and reliability requirements of industrial operations with an attempt to define the "trustworthiness" of emerging manufacturing networks. An industrial IoT security blueprint released on Monday (Sept. 19) by a two-year-old industry consortium stresses five characteristics for bullet proofing ... Full article
September 13, 2016(0)
Despite an alarming increase in the frequency and severity of cyber attacks, enterprises large and small claim they are doing enough to mitigate the effects of a data breach. New data released this week by market analyst Juniper Research indicates that a whopping 86 percent of U.K. enterprises responding to a recent survey believe they are doing enough to ... Full article
September 9, 2016(0)
A retired Air Force General has been tapped to be the nation's first chief information security officer, the Obama administration announced this week. Retired Brig. Gen. Gregory Touhill previously served as director of command, control, communications and cyber systems at the U.S. Transportation Command. Touhill currently serves as a deputy in the Department of Homeland Security's Office of Cybersecurity ... Full article
August 29, 2016(0)
Japanese engineers claimed to have developed the first secure "cryptoprocessor" able to adjust security levels on the fly without first upgrading the device itself. Previously, the researchers noted, encryption hardware required an upgrade as secure key lengths using approaches like RSA public key cryptography increased beyond 512 bits. Japan's Science and Technology Agency supported secure cryptoprocessor development conducted by ... Full article
August 19, 2016(0)
The shift from traditional datacenters to cloud infrastructure is exponentially expanding server workloads, thereby increasing enterprises' "attackable surface area" and, with it, security risks, a new vendor survey warns. CloudPassage Inc., a security platform vendor focusing on shielding servers running in datacenter and cloud infrastructure, polled attendees at the recent Black Hat security conference. In findings released Friday (Aug. ... Full article
August 16, 2016(0)
Blockchain and other "crypto-currency" technologies are gathering momentum as investors continue to pour money into digital transaction approaches while banks shift from pilot projects to production deployments. According to estimates by U.K. market analyst Juniper Research, venture capitalists invested $290 million in blockchain technologies and Bitcoin companies during the first six months of this year. The researcher said more ... Full article
August 9, 2016(0)
With security threats growing more sophisticated, the market for information security products is expected to boom over the next five years, led by security testing, IT outsourcing and data loss prevention offerings. Market watcher Gartner Inc. (NYSE: IT) said this week the IT security market would top $81 billion this year, a 7.9 percent annual growth rate that is ... Full article
July 15, 2016(0)
Security information and event management (SIEM) software fueled a robust global security software market in 2015 even as sales of consumer security software declined sharply last year, according to the latest accounting by market analyst Gartner Inc. Gartner (NYSE: IT) reported this week that worldwide security software revenue jumped 3.7 percent over the previous year to $22.1 billion. Sales ... Full article
July 6, 2016(1)
U.S. intelligence agencies, including the National Security Agency, are increasingly turning to commercial solutions in their efforts to head off the alarming number of cyber attacks that culminated in last year's massive breach at the U.S. Office of Personnel Management. With critics complaining that government agencies have done little since the OPM attack to harden their networks, NSA's Information ... Full article

More articles

Share This