Cisco Completes Acquisition Of ThousandEyes
Cisco's strength in network and application performance, combined with visibility into the internet enabled by ThousandEyes, now allows customers to have an end-to-end view into the digital delivery of applications and services over the internet.
An Exploration of Files and Objects for Data Storage (Pure Storage)
Since files and objects are both important, widely used forms of data representation, supporting both in one system is an attractive goal. At the same time, there are deep differences between files and objects, so supporting both in a single system presents an interesting challenge.
5 Ways to Ensure Success When Migrating to a Cloud-Based Secure Web Gateway (Forcepoint)
Many organizations currently rely on on-premises secure web gateway (SWG) appliances to filter web traffic and enforce policies that block malicious code and inappropriate content. However, the flexibility that cloud-based SWG solutions offer organizations continues to drive interest.
Citrix provides security update on Citrix Endpoint Management
Any versions prior to 10.9.x must be upgraded to a supported version with the latest rolling patch. We recommend that you upgrade to 10.12 RP3, the latest supported version. We recommend these upgrades be made immediately. While there are no known exploits as of this writing, we do anticipate malicious actors will move quickly to exploit.
The Gartner 2020 Magic Quadrant for PAM is Here! (CyberArk)
CyberArk has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management. CyberArk was positioned both highest in ability to execute and furthest in completeness of vision, for the second time in a row.
Measuring Security Effectiveness: Infiltrations and Ransomware (FireEye)
Security teams install security tools in their default configurations and fail to perform updates. As a result, those controls are not able to detect the latest attacks. Another common cause is that organizations are not clear on how to test against real ransomware attacks, so they blindly trust that their controls are working.
NVIDIA Shatters Big Data Analytics Benchmark
Using the RAPIDS suite of open-source data science software libraries powered by 16 NVIDIA DGX A100 systems, NVIDIA ran the benchmark in just 14.5 minutes, versus the current leading result of 4.7 hours on a CPU system. The DGX A100 systems had a total of 128 NVIDIA A100 GPUs and used NVIDIA Mellanox networking.
FireEye’s bug bounty program goes public
Bug bounty programs are a way to 'crowdsource' the hunt for vulnerabilities. Thousands of organizations now offer bug bounties to researchers who privately disclose security flaws they find through these programs and provide both financial rewards and credit in return.
Cyber Adversaries Are Exploiting the Global Pandemic at Enormous Scale (Fortinet)
While these attacks cover a spectrum of strategies, cybercriminals have heavily targeted the sudden expansion of new teleworkers – literally millions of remote workers expanded the digital attack surface almost overnight – along with their vulnerable home networks and devices and unprotected browsers.
Pure Storage and Cohesity Forge Strategic Partnership to Deliver Rapid Recovery at Scale
Pure and Cohesity have formed this partnership based on strong customer demand for an integrated all-flash data protection solution that empowers customers to easily, quickly, and reliably back up and recover their data at scale. The companies have also formed this partnership at a time when more customers are embracing cloud services and are seeking ransomware protection.
Data privacy and data security are not the same
For many outside of the infosec community, the terms 'data security' and 'data privacy' are often used interchangeably. In reality, even though they share a common goal, they are not the same.