Ad Image

Endpoint Security and Network Monitoring News for the Week of October 27; Tenable, Zscaler, Tufin, and More

endpoint security and network monitoring news for the week of October 27

endpoint security and network monitoring news for the week of October 27

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of October 27. This curated list features endpoint security and network monitoring vendors such as Tenable, Zscaler, Tufin, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security and Network Monitoring News for the Week of October 27


Tenable and Siemens Energy Expand Collaboration on OT Cybersecurity

Tenable, Inc. an Exposure Management sol, today announced that it has expanded its partnership with Siemens Energy to further secure operational technology (OT) environments in the energy sector. Building on years of collaboration, Siemens Energy will integrate Tenable OT Security into their Omnivise T3000 control system as a network intrusion detection system (NIDS), in addition to already leveraging Tenable OT Security for asset discovery and vulnerability management. Siemens Energy’s decision to bring Tenable into this flagship offering joins existing collaboration on their recently rebranded cybersecurity service offering, Omnivise OT Security, powered by Tenable.

Read on for more.

Zscaler ThreatLabz: “400 Percent Increase in IoT and OT Malware Attacks Year-over-Year”

Zscaler, Inc., a leader in cloud security, announced this week the release of the Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report.  The number of attacks on IoT devices saw a 400 percent increase in malware compared to the previous year. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security, as the mobility of malware can facilitate movement across different networks, potentially endangering critical OT infrastructure.

Read on for more.

What to Expect at Solution Review’s Solution Spotlight with Broadcom on November 16th

With the next Solution Spotlight event, Solutions Review’s team has again partnered with Broadcom, a leader in cybersecurity and network monitoring solutions. In this webinar session, an expert from Broadcom will provide viewers with tips on enhancing the end-user experience across hybrid and multi-cloud environments.

Read on for more.

Tufin Announces Major Update and Capabilities to Tufin Orchestration Suite

Tufin, a network and cloud security policy automation solutions provider, this week announced the release of Tufin Orchestration Suite (TOS) version R23-2. The latest edition streamlines Secure Access Service Edge (SASE) policy management across an organization’s hybrid network, expedites security audits and compliance efforts, and enhances application connectivity triage, offering organizations a “comprehensive solution for their evolving security and networking needs.”

Read on for more.


Expert Insights Section

Insight Jam

Watch this space each week as our editors will share the best written and video resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.

 

Social Media Scams Impacting Businesses and Individuals Today

John Wilson of Fortra’s Agari breaks down common social media scams, their impact on businesses, and how to protect yourself against them. Social media has become the proverbial double-edged sword, equal parts meaningful connection, and highly convincing fraud. The challenge is that it’s sometimes hard to spot the difference. Threat actors use social media to target companies and individuals alike with the goal of stealing information they can monetize or hocking lookalike goods. As a Senior Fellow for Threat Research, I work daily with those targeted by these criminals to take down their scams. According to research from Fortra’s PhishLabs, attacks on businesses were nearly 19 percent more common in Q4 of 2022 than in the same quarter of 2021. Companies faced an average of 73 attacks per month on their social channels. On the consumer side, the Federal Trade Commission found that in 2022, end-users lost $1.2 billion as a result of scams originating on social media. Fraudsters worldwide are flocking to these platforms as an attractive attack vector. It’s easy to see why: they offer the ability to reach a mass audience quickly and at a very low cost. Here, we’ll highlight the most common scams and how to protect yourself, your organization, and your data.

Read on for more.

Breaking Software Security To Fix It: 5 Steps to Training that Delivers More Secure Applications

Ed Adams of Security Innovation walks us through why you may need to break software security before you can fix it. Software runs the modern world, from online trading applications to cloud-based SaaS, Medical Devices, and even hardware. These software-driven systems incorporate maze-like interconnections and dependencies that make them vulnerable to attack. Compounding the challenge are the blurred lines between builders, operators, and defenders, who all have a hand in building and deploying software securely. Software’s security stakeholders have exploded beyond the core developer in the rapid-release world of agile, DevOps, and CI/CD. Cross-functional skills are more critical than ever; however, long-established training methods aren’t keeping up with emerging technologies, methodologies, and roles.

Read on for more.

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Share This

Related Posts