Security

Networkworld

While no one was looking, California passed its own GDPR

The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance.Well, there is no weaseling out now. Last week, with no fanfare, California Governor Jerry Brown signed into law AB375, the California Consumer Privacy Act of 2018, the California equivalent of GDPR that mirrors the EU law in many ways.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

Pulse Secure VPN enhanced to better support hybrid IT environments

The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity — and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a consistent user experience, compliance with corporate policies and regulatory requirements, and strong end-to-end security.This is the playing field for Pulse Secure, a company that has built a broad portfolio of access products and services that are available as a unified platform. Pulse Secure has considered practically every use case and has built a range of solutions to solve the secure connectivity challenges that IT organizations face. The company claims to have more than 20,000 customers and a presence in 80 percent of global enterprises — maybe even yours.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

Summer Vacation Plans? Be Safe When Connecting!

Tips to Protect Yourself While Traveling Summer travel should be a respite from work, when you relax and don’t have to worry about business. And your mobile devices can help make it easier, whether it’s booking a flight or a hotel room, ordering a cab or an Uber driver, browsing websites for your next destination,…
The post Summer Vacation Plans? Be Safe When Connecting! appeared first on . Read More HERE…

Read More
TrendMicro

The Safety of Your Data On Social Media

Trend Micro recently asked a simple question on Twitter, “Are you worried about the safety of your data when using social media?” More than 33,000 responses later and the answer is a toss up. The discussions in response to our tweet didn’t provide a clear answer either. This is despite months of high profile Facebook…
The post The Safety of Your Data On Social Media appeared first on . Read More HERE…

Read More
TrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 25, 2018

I have never reverse engineered anything, but I did dismantle a Betamax VCR and put it back together without an instruction manual. My little brother liked to use the tape slot as a garage for his Hot Wheels® toy cars. We were usually able to take out the cars without any issues, but one day,…
The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 25, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 18, 2018

As I pull together the list of zero-day filters for this blog, I see all types of vulnerabilities from various vendors. My interest is always piqued when I see a vulnerability affecting a security company. The Zero Day Initiative’s (ZDI) interest was also piqued when the researcher Pagefault submitted a Bitdefender vulnerability to the ZDI…
The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 18, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

Trend Micro a Leader in Forrester Wave Endpoint Security Report

The results are in from another independent analyst report and it’s great news for Trend Micro’s endpoint security. We achieved the highest score possible for the “strategy” category, were top ranked for “current offering” category, and among the second-highest scores in the market presence category, according to The Forrester Wave™: Endpoint Security Suites, Q2 2018[1]…
The post Trend Micro a Leader in Forrester Wave Endpoint Security Report appeared first on . Read More HERE…

Read More
TrendMicro

Can Your Managed Detection and Response Service Do This?

Submitted by Steve Duncan Trend Micro has recently introduced its Managed Detection and Response Service to North America.  This spring at the RSA show in San Francisco I had that chance to catch up with Jon Oltsik of ESG again to discuss our new offering and why we think the time is right. As attackers…
The post Can Your Managed Detection and Response Service Do This? appeared first on . Read More HERE…

Read More
Networkworld

Microsoft adds resiliency, redundancy, security to Windows Server 2019

With Windows Server 2019, Microsoft is adding resiliency and redundancy enhancements to the Shielded Virtual Machines security controls it introduced with Windows Server 2016.Shielded VMs originally provided a way to protect virtual machine assets by isolating them from the hypervisor infrastructure and could also help prove to auditors that systems were adequately isolated and controlled. Now Shielded VM enhancements in Window Server 2019 provide real-time failback configurations and host- and policy-based security improvements.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ]
Host key attestation
Under Windows Server 2016, key authentication was based on trusted platform module (TPM) cryptoprocessors and Microsoft Active Directory authentication.  Both of these are great solutions but were limited when it comes to extensibility and redundancy.To read this article in full, please click here(Insider Story) READ MORE HERE…

Read More