Archive for the Category
‘From: CSO Online’

With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

Businesses are adopting public clouds to enable them to work faster and be more agile, which are both critical to success in the digital era. In fact, many organizations have adopted a “cloud first” approach, where the mandate is to move every new application to the public clouds.

Along with the benefits of cloud computing — increased agility, faster time to market, and the ability to scale infrastructure — though, comes increase security challenges.

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

Over the past five years, the cloud has gone from being something that augments a business’s IT strategy to being the core of it. It’s now commonplace to hear organizations, small and large, say they have a “cloud-first” strategy. The cloud offers unprecedented scale, elasticity and agility for digital organizations to build apps on and be able to change on the fly.

For most companies, though, there is no single thing called “the cloud.” It’s likely the term “cloud” means multiple public clouds with some private cloud thrown into the mix.

Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have come together to create a joint solution.

In almost every conversation I have today with business or IT leaders, the topic of security and risk comes up. Want to move to the cloud? Sounds great, but what about security? Thinking of rolling out a new customer-facing application? That could change the business, but how do we protect the data? Considering an IoT strategy? Makes sense, but what kind of new risks does that create?

Performing continual security tool evaluations and proofs of concept can be taxing on security teams. Security delivery platforms can greatly simplify the process.

With the rise in both the volume and variety of cyber threats, it seems there are now specialized tools for almost everything.

This was never more obvious than at the latest RSA Conference, where there were more than 800 exhibitors — almost 200 of which were first-time sponsors.

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

Last summer, Cisco announced a product called Encrypted Traffic Analysis (ETA), which solves one of the biggest cybersecurity problems — finding malware in encrypted traffic.

The use of encrypted traffic continues to grow. In fact, it’s over half of all traffic today and will be well over 80 percent by 2020. The benefit of encrypting traffic is that the bad guys can’t access the data, so it’s protected. The downside of it is that security tools can’t inspect it for malware, making it the perfect place for a threat actor to hide any kind of malicious traffic.

DigiCert’s already capable team gains some of the industry’s best talent and resources in the area of SSL/TLS certificates and related PKI solutions.

Last week DigiCert announced it had closed on the billion-dollar acquisition of Symantec’s security business previously announced in August of this year. The deal adds to DigiCert’s capable team some of the industry’s best talent and resources in the area of SSL/TLS certificates and related PKI solutions. As the world becomes more cloud and IoT-centric, these are security technologies that companies need to pay more attention to.

Avi’s Intelligent Web Application Firewall (iWAF) is a software-only solution that solves the performance problems associated with traditional, hardware-based WAFs.

I’ve long had the opinion that web application firewalls (WAF) are one of those security technologies that every business should deploy.  For a hacker, breaching an organization through a state of the art, next generation firewall is quite a difficult task.  It’s much easier to go after naïve users by directing attacks through a web application.  The best way to combat these threats is with a WAF. Given the rise of web related attacks like SQL injection and session hijacking, it would stand to reason every business would deploy one. 

Insight and Influence Through Social Media
ZK Research: Home
RSS Feed
ZK Research is proudly powered by WordPress | Entries (RSS) | Comments (RSS) | Custom Theme by The Website Taylor