Transport Layer Security

Censys Releases 2023 State of the Internet Report Evaluating the State of Security on the Modern Internet

Retrieved on: 
Wednesday, April 19, 2023

ANN ARBOR, Mich., April 19, 2023 /PRNewswire/ -- Today, Censys, the leading internet intelligence platform for threat hunting and exposure management, announced its 2023 State of the Internet Report. This year's report focuses on web-based vulnerability and HTTP services across the internet, and now, Censys is making its solution for managing Web Entities within its Exposure Management platform generally available.

Key Points: 
  • ANN ARBOR, Mich., April 19, 2023 /PRNewswire/ -- Today, Censys , the leading internet intelligence platform for threat hunting and exposure management, announced its 2023 State of the Internet Report .
  • Using Censys' industry-leading global scanning engine, the 2023 State of the Internet Report provides visibility into the assets and weaknesses across organizations' internet infrastructure divided into three sections: HTTP services, certificates, and the attack surfaces of the internet.
  • Censys leveraged their internet-wide scan data to better understand the applications and services that have become core to our existence, evaluating the state of security on the modern internet.
  • Censys' 2023 State of the Internet Report found that:
    While misconfigurations don't often make headlines, they remain a major problem.

VMware Enhances VMware Tanzu and VMware Aria Platforms to Help Accelerate Modern App Development and Delivery in Response to Customers’ Most Urgent Needs

Retrieved on: 
Tuesday, April 4, 2023

“Our customers across the enterprise are engaged in a cumbersome balancing act -- juggling multiple tools, teams, clouds, and operating models while at the same time keeping developers productive and the operations team equipped to keep pace. This scenario demands a new approach around a common cloud native app platform and a multi-disciplinary platform engineering team,” said Purnima Padmanabhan, General Manager and SVP, Modern Applications and Management Business Group, VMware. “Customers tell us they need to rapidly innovate while at the same time manage cost, security, and performance. In response, we expedited the launch of new capabilities across VMware Tanzu and VMware Aria. We are committed to helping customers drive innovation and optimization every step of the app development and cloud management journey.”

Key Points: 
  • VMware, Inc. (NYSE: VMW) today announced new capabilities across the VMware Tanzu and VMware Aria platforms to empower customers with the capabilities to take a cloud-smart approach to modern application delivery across any cloud.
  • In response, we expedited the launch of new capabilities across VMware Tanzu and VMware Aria.
  • Additionally, the company is introducing innovations across the VMware Aria platform including Aria Hub powered by Aria Graph, Aria Cost powered by CloudHealth, and Aria Guardrails.
  • For more information on VMware’s Tanzu and VMware Aria solutions, access these blogs and webpages:

New Analysis from Securin Inc. and Ivanti Finds Potential Security Gaps in Indian State Governments’ Public-Facing Assets

Retrieved on: 
Thursday, March 30, 2023

Securin Inc. and Ivanti have conducted an investigation into the cyber hygiene of Indian state government domains and found several potential gaps in their current security practices.

Key Points: 
  • Securin Inc. and Ivanti have conducted an investigation into the cyber hygiene of Indian state government domains and found several potential gaps in their current security practices.
  • The investigation used the Securin Attack Surface Management platform to passively examine the domains of Indian state governments and union territories.
  • A few key findings are as follows:
    Over 10% of domains in Indian states do not have the Secure Sockets Layer (SSL) encryption—a basic security protocol layer.
  • Organizations must continuously strengthen their security posture, and the first step to that is knowing where your weaknesses are.”

Asset Panda Achieves Systems and Organization Controls (SOC) 2 Compliance, Proving the Effectiveness of the Platform's Security Measures

Retrieved on: 
Monday, March 13, 2023

FRISCO, Texas, March 13, 2023 /PRNewswire-PRWeb/ -- Asset Panda, a leading asset relationship management platform, announced today that it has achieved Systems and Organization Controls (SOC) 2 compliance set by the American Institute of Certified Public Accountants (AICPA). SOC 2 compliance is a recognized assurance standard for Software-as-a-Service (SaaS) providers that demonstrate the highest levels of data security and privacy for customer data and resources. The certification of compliance is an additional commitment to security and data protection by Asset Panda for all of its customers.

Key Points: 
  • FRISCO, Texas, March 13, 2023 /PRNewswire-PRWeb/ -- Asset Panda , a leading asset relationship management platform, announced today that it has achieved Systems and Organization Controls (SOC) 2 compliance set by the American Institute of Certified Public Accountants (AICPA) .
  • The certification of compliance is an additional commitment to security and data protection by Asset Panda for all of its customers.
  • The audit required Asset Panda to demonstrate the effectiveness of its security controls and included verification of the platform's data processing integrity, storage, security architecture, and privacy.
  • With the SOC 2 designation, Asset Panda offers customers the highest available level of Secure Sockets Layer (SSL) encryption and SOC 2-compliant controls.

Sophos Expands Firewall Portfolio with Enterprise-Grade Appliances that Broaden Market Opportunities for Channel Partners

Retrieved on: 
Tuesday, February 21, 2023

The new XGS 7500 and 8500 models provide unrivaled performance and protection for large enterprise and campus deployments, broadening market opportunities for the channel partners that serve them.

Key Points: 
  • The new XGS 7500 and 8500 models provide unrivaled performance and protection for large enterprise and campus deployments, broadening market opportunities for the channel partners that serve them.
  • “Sophos is shaking up the competitive enterprise firewall landscape with these new high-performance appliances, providing best in class price per protected megabit per second (Mbps).
  • Sophos Firewall is available for immediate purchase exclusively through Sophos’ global channel of partners and managed service providers (MSPs).
  • “Ingram Micro is one of a handful of worldwide partners – and the only distributor – that had early access to these new models.

Global 3D Secure Payment Authentication Market Report 2022: Liability Of 3D Secure For Chargebacks Bolsters Adoption - ResearchAndMarkets.com

Retrieved on: 
Monday, January 30, 2023

The Global 3D Secure Payment Authentication Market size is expected to reach $2 billion by 2028, rising at a market growth of 11.6% CAGR during the forecast period.

Key Points: 
  • The Global 3D Secure Payment Authentication Market size is expected to reach $2 billion by 2028, rising at a market growth of 11.6% CAGR during the forecast period.
  • Based on the component, the market for 3D secure payment authentication is divided into access control servers, merchant plug-ins, and others.
  • The market for 3D secure payment authentication was dominated by North America in 2021, with the largest revenue share, worldwide.
  • To combat CNP fraud, retailers all around the United States and Canada are implementing 3D secure payment authentication more frequently.

Evolution Equity Partners Appoints Taher Elgamal as General Partner

Retrieved on: 
Thursday, January 19, 2023

NEW YORK, Jan. 19, 2023 /PRNewswire/ -- Evolution Equity Partners a leader in cybersecurity venture capital announced today that Taher Elgamal has joined the firm as a general partner. Taher joins the firm after serving as venture partner at Evolution since 2016 and after a decade at Salesforce where he was CTO, Security. He joins a team of twenty investment professionals with six general partners focused on investment in best of breed cybersecurity companies.

Key Points: 
  • Elgamal joins Evolution as the firm expands team, capital base and access to best of breed cybersecurity software companies amidst growing investment opportunity
    NEW YORK, Jan. 19, 2023 /PRNewswire/ -- Evolution Equity Partners a leader in cybersecurity venture capital announced today that Taher Elgamal has joined the firm as a general partner.
  • He joins a team of twenty investment professionals with six general partners focused on investment in best of breed cybersecurity companies.
  • said Richard Seewald, Founder and Managing Partner at Evolution Equity Partners.
  • Taher Elgamal, General Partner at Evolution Equity Partners stated " I am excited to be joining this great team at Evolution Equity Partners and to continue the work of building companies and growing a portfolio of leading cybersecurity companies.

Venafi Brings Cloud Native Machine Identity Management to VMware Tanzu

Retrieved on: 
Tuesday, January 10, 2023

Venafi® , the inventor and leading provider of machine identity management, announced that VMware has integrated Venafi’s machine identity control plane into its Tanzu Service Mesh .

Key Points: 
  • Venafi® , the inventor and leading provider of machine identity management, announced that VMware has integrated Venafi’s machine identity control plane into its Tanzu Service Mesh .
  • The Venafi integration enhances the Tanzu Service Mesh by enabling organizations to automate the management of their machine identity lifecycles as part of their established CA trust chains.
  • “Other service mesh – such as Istio – only support self-signed machine identities out-of-the-box, which fall outside of companies’ existing machine identity management infrastructure and trust chains.
  • It’s great to see VMWare is addressing this security gap by tapping into the control plane for machine identity management in a way that’s frictionless and security-team approved.”

Women’s Tennis Association Selects Zscaler to Accelerate Secure Digital Transformation Initiatives

Retrieved on: 
Monday, December 12, 2022

“WTA made Zscaler a focal point of our Zero Trust strategy,” said Paul Sheth, Head of Information Security at the WTA.

Key Points: 
  • “WTA made Zscaler a focal point of our Zero Trust strategy,” said Paul Sheth, Head of Information Security at the WTA.
  • “With Zscaler, we can enable our entire staff to work securely from anywhere two to three times faster than with competitive solutions.
  • To accelerate its secure digital transformation initiatives, the organization then selected Zscaler as its trusted cloud security partner of choice.
  • “By selecting Zscaler, the WTA has not only accelerated its secure digital transformation but established an extensible and scalable zero trust foundation for future phases in its transformation journey,” said Steve House, Senior Vice President, Product Management at Zscaler.

Stick with Security: Store sensitive personal information securely and protect it during transmission

Retrieved on: 
Friday, December 16, 2022

Careful companies take the advice of Start with Security by storing sensitive personal information securely and protecting it during transmission.

Key Points: 
  • Careful companies take the advice of Start with Security by storing sensitive personal information securely and protecting it during transmission.
  • Hackers cant steal what you dont have, so collect and maintain confidential data only if you need it.
  • Asking customers for sensitive information on the off chance you might use it someday for something isnt a sound policy.
  • The wiser practice is to sensibly limit what you collect and then store it securely.
  • Encryption is the process of transforming information so that only the person (or computer) with the key can read it.
  • Companies can use encryption technology for sensitive data at rest and in transit to help protect it across websites, on devices, or in the cloud.
  • You cant keep information secure unless you have a clear picture of what you have and where you have it.
  • By not storing that information securely, the retailer has increased the risk of unauthorized access.
  • The business uses appropriate encryption to secure the information when its sent from the customers browser to the companys server.
  • By encrypting the initial transmission of information, the real estate company has taken a prudent step to keep it safe.