Akamai (AKAM) has purchased Bloxx, a provider of secure Web gateway technology, as part of a larger strategy to roll out new enterprise security offerings.
Elizabeth Montalbano 1
Elizabeth Montalbano is a freelance writer who has written about technology and culture for more than 15 years. She has lived and worked as a professional journalist in Phoenix, San Francisco, and New York City. In her free time she enjoys surfing, traveling, music, yoga, and cooking. She currently resides in a small village on the southwest coast of Portugal.
Recent articles by Elizabeth Montalbano 1
- November 10, 2015
Customers of Dropbox and the Okta identity-management system can now feel more secure sharing business applications using the online collaboration platform through a new partnership the companies have forged with Vera.
- November 10, 2015
While security has typically been one of the biggest concerns when considering the move to cloud computing, it’s actually the cloud that should become the new security model as companies adopt the latest connected solutions like mobile apps and the Internet of Things (IoT).
- November 4, 2015
Mobile device security is an imminent concern for the enterprise as more and more workers are accessing business applications from their smartphones. In fact, a recent survey found that risk to these devices is dire and the need for security is now.
- November 3, 2015
It’s never a bad idea for a company to get a better sense of its security posture. That’s why F-Secure (FSOYF ) recently launched a new online tool that can help companies learn more about what’s happening on their networks in terms of security and discover the kinds of vulnerabilities that can expose them to risks.
- November 2, 2015
Mobile devices are under constant and serious attack, bad news for enterprises whose employees increasingly are using the devices to access business apps.
- October 28, 2015
E8 Security has unveiled a new behavioral intelligence platform that not only analyzes threats to the network but also adapts security infrastructure as it learns about them.
- October 27, 2015
Research already has shown that companies think that sharing threat intelligence is a good idea to help keep their data and assets secure. Now LookingGlass Cyber Solutions is offering a secure, open exchange to help enterprises do exactly that securely across security operations.
- October 26, 2015
IT staff pose some of the biggest threats to enterprise security, according to a recent insider risk survey commissioned by Intermedia.
- October 21, 2015
Security firm Rapid7 (RPD) has purchased machine data-search technology provider Logentries to expand the functionality of its security data and analytics solutions, which provide companies with incident detection and response.
- October 19, 2015
Hackers have attacked 1 in 4 Internet user accounts in the last year but consumers still aren’t increasing password safety, according to new research.
- October 14, 2015
Cisco Systems (CSCO) has done its part to help rid the world of ransomware by striking a major blow to one of the largest exploit kits on the market for this type of security threat.
- October 13, 2015
Wearable technology might be giving people better access to fitness, health and other information, but it’s posing a headache for security professionals in the workplace, according to a recent survey.
- October 12, 2015
Seculert has updated its Attack Detection Platform with an attack visibility dashboard that provides a dynamic view against persistent network threats.
- October 7, 2015
Cloudera continues to add to its portfolio of offerings to secure the Apache Hadoop enterprise data management platform. Its latest release is a new security layer called RecordService that centrally enforces role-based access control policies across Hadoop and acts as a complementary technology to existing policy control, the company said.
- October 6, 2015
It’s no secret that with the Internet of Things (IoTs) comes a whole new set of security challenges. To help identify and address some of these scenarios, the Cloud Security Alliance has released new guidance for handling identity and access management when connecting myriad devices over a wireless sensor network.
- October 5, 2015
Rackspace (RAX) already manages the complexity of cloud environments for customers. Now the cloud infrastructure provider is expanding services to manage security and compliance within those clouds with a new portfolio of offerings.
- September 30, 2015
Splunk has expanded its solutions for real-time operational intelligence with a new behavior analytics offering and new functionality for its enterprise software that provides more visibility into the movement of attackers on a network, the company said.
- September 29, 2015
Fujitsu has launched a new cloud service to manage and secure multiple cloud environments within an organization.
- September 28, 2015
Syncsort has updated its Ironstream technology to collect mainframe data for monitoring and analysis by Splunk security tools.