Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.
Quest Software announced the release of Kace Systems Management Appliance (SMA) 9.0 on Sept. 17, providing its customers with new capabilities to manage and secure network-attached devices. KACE SMA 9.0, which is also known as the K1000, adds new automated service desk ticketing capabilities to help speed up remediation and update processes. Software license asset management […]
Gee Rittenhouse took over leadership of Cisco’s Security Business Group in April 2018 and has been on a mission ever since—to make security foundational everywhere within Cisco. In a video interview with eWEEK, Rittenhouse discusses his mission at Cisco, the influence of cloud, the role of endpoint security and how intent-based networking helps to pull […]
A group of mobile carriers including AT&T, Sprint, T-Mobile and Verizon are working together to improve the state of mobile authentication. The carriers are working together in a group called the Mobile Authentication Taskforce, which officially announced its Project Verify effort on Sept. 12. With Project Verify, the carriers are looking to use different signals […]
Organizations of all sizes are increasingly choosing to deploy and consume cloud-native applications, though not all deployments are secure. Container security firm Twistlock released a study on Sept. 13, reporting that 60 percent of cloud-native applications have not been patched to the latest version. The 15-page Cloud Native Security report, titled Watching the Honeypots, benefits […]
Bomgar announced on Sept. 13 that it is acquiring privately held BeyondTrust in a deal that is expected to close in October. After the acquisition closes, Bomgar will be renamed BeyondTrust. Financial terms of the deal are not being publicly disclosed, though according to Bomgar the combined company post-acquisition will have more than 800 employees, […]
Red Hat announced the general availability of its Ansible Tower 3.3 release, which provides new automation capabilities for organizations. Among the new features in Red Hat Ansible Tower 3.3 is an updated user interface that provides more information to users. Scalability is another area where Red Hat has improved Ansible Tower, with new ways to […]
FireEye released its first half of 2018 Email Threat Report on Sept. 12, finding that most of the email its security systems have analyzed were potentially at risk. The analysis is based on a sample set of over half a billion emails that FireEye examined from January to June 2018. Only 32 percent of email […]
Corelight is pushing forward with a strategy to advance its network security platform, based on the open-source Bro security project. On Sept. 11, Corelight announced that it raised $25 million in a Series B round of funding, led by General Catalyst. Total funding to date for Corelight stands at $34.2 million. The new funding follows […]
The California Consumer Privacy Act of 2018 didn’t have the big multi-year run up like the EU’s GDPR, but it will have significant impact on organizations that do business in the state of California. And given that California is the world’s fifth-largest economy, that means everyone. Businesses like yours have less than two years until […]
Proofpoint announced on Sept. 5 the launch of its new Closed-Loop Email Analysis and Response (CLEAR) technology, as well as a new partnership with Okta to help combat email credential phishing attacks. The CLEAR offering is the first technology developed by Proofpoint together with its new Wombat security division. With CLEAR, organizations can automatically report, analyze […]