Cisco is beefing up the security capabilities of its Tetration analytics, with tools to protect workloads running "in any data center and for any cloud," the company announced on March 5.
The new tools protect bare-metal, virtualized and containerized workloads, inventorying software packages and cross-referencing them against known vulnerabilities. IT organizations can set up automated policies to take action against detected vulnerabilities and threats.
Tetration also establishes a baseline of normal application behavior, and flags deviations from the norm that might indicate possible threats.
You're invited to attend Light Reading's Big Communications Event -- the one event that delivers fresh perspective on the rapid transformation of the telecom industry and the road ahead. We'll see you May 14-16 in Austin -- communications service providers get in free!
Cisco is part of a trend toward automating security, driven by several trends. Threats are mounting. Enterprises are becoming more digital, making IT systems more important than ever. And IT budgets are dwindling, making security resources strained. Cisco, Amazon Web Services, Alphabet and Juniper are all stepping in with automation tools.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.