secure enclaves

Secure Enclaves: A New Approach to Cybersecurity

|
Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely “The world runs on software” and “software is eating the world” are phrases you have probably ...
Security Boulevard

Venafi Study: Organizations Fail to Protect Keys and Certificates as Effectively as Usernames and Passwords

| | Venafi
Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities SALT LAKE CITY – December 19, 2019 – Venafi®, the inventor and leading provider ...
Security Boulevard
ZombieLoad

Can Applications Withstand the ZombieLoad Attack?

As if Meltdown, Spectre and Foreshadow were not enough, recently a new critical vulnerability called ZombieLoad has been discovered that affects a series of modern Intel processors. This vulnerability enables a potential ...
Security Boulevard
SiteLock

SiteLock Extends Database Security Reach to MySQL

SiteLock this week extended the reach of its tool for finding and removing malware from databases to include the open source MySQL database. Previously, the SMART Database only supported websites built using ...
Security Boulevard
network security

Network Security: Keys to Adopting Zero-Trust, Micro-segmentation

|
Adopting zero-trust and micro-segmentation as core design principles can help improve the security posture of your network and attached systems. However, it is important to understand how we got to our current ...
Security Boulevard
microsegmentation

Edgewise Networks Simplifies Microsegmentation

Fresh off raising an additional $11 million in financing, Edgewise Networks this week launched a platform that enables organizations to apply microsegmentation via a single mouse click. Edgewise Networks CEO Peter Smith ...
Security Boulevard
Challenges of Securing a Cloud-Native World

Meeting the Challenges of Securing a Cloud-Native World

Just a couple of years ago, developers were using container technologies to quickly provision systems for their prototyping and testing. Today, enterprises are implementing multiple technologies such as Kubernetes for orchestration and ...
Security Boulevard
Android army

Android Security is a Hot Mess (yet Again)

Google’s Android smartphone platform is under fire again. Hundreds of “legitimate” apps have been infected with malicious third-party libraries—and not for the first time. These apps account for more than 320 million downloads ...
Security Boulevard

Estonia’s Volunteer Cyber Militia

|
Interesting -- although short and not very detailed -- article about Estonia's volunteer cyber-defense militia. Padar's militia of amateur IT workers, economists, lawyers, and other white-hat types are grouped in the city ...
cybersecurity AI

Carbonite to Unify Security and Data Protection by Acquiring Webroot

|
Carbonite has announced it will acquire Webroot as part of an effort to meld data protection and endpoint security, in a deal valued at $618.5 million. Norman Guadagno, senior vice president of ...
Security Boulevard