Microsoft said it has used this approach 12 times in two years to shut down 84 fake websites associated with the state-sponsored hacking group called Fancy Bear.
Oracle debuts another autonomous database cloud service; Facebook open sources its transport layer security library; and AWS rolls out serverless option for Amazon Aurora.
On the sidelines at Black Hat, a Microsoft exec said the Tech Accord is an example of how the company works with other technology vendors to advance security.
During the Black Hat Keynote, Google’s Parisa Tabriz, who manages the Project Zero bug hunting team, urged tech companies to build coalitions to solve complex security problems.
"It’s somebody’s day job to make sure they exploit you and remain a presence on your network,” said Josh Ray, global cyber defense lead for Accenture Security.
Rahul Kashyap joins Awake from endpoint security company Cylance and says while endpoint has seen all the action over the past couple of years, “the network is where the
Threat researchers found a rise in attacks on widely-used enterprise resource planning (ERP) applications such as SAP and Oracle, which currently have a combined 9,000 known security vulnerabilities.
While it’s not the first security firm to go public this year — Zscaler and Carbon Black also completed successful IPOs — at $288 million it would be the
Unlike traditional security platforms that target this type of malware from a threat prevention vantage point, the data protection and management company comes at it from a backup perspective.
Both Corelight and Databricks are based on open source technologies — Corelight on Bro and Databricks on Apache Spark. While the open source technologies have been combined, this is
Sift’s product, Cloud Hunter, uses machine learning, analytics, and graph visualization capabilities to detect and respond to threats across infrastructure-as-a-service platforms.
Following the tumultuous purchase of Brocade (that reportedly led to the layoffs of 1,100 employees) and the blocked purchase of Qualcomm — Broadcom seeks to diversify its portfolio with
Illumio’s new head of cybersecurity strategy — former Obama administration executive Jonathan Reiber — literally wrote the book on cyberstrategy at the U.S. Department of Defense. Reiber is Illumio’s
The company’s platform “preempts” threats (hence the name) based on identity, behavior, and risk. One of its new investors — Blackstone — started as a customer.
This brings its total to $39 million. Kleiner Perkins led the funding round with participation from Battery Ventures, Dell Technologies Capital, TenEleven Ventures, and Vertical Venture Partners.
Ping Identity also launched a new product that builds on Elastic Beam’s technology, as well as its own API security product, and uses AI to identify and block attacks