Ad Image

Endpoint Security and Network Monitoring News for the Week of May 31; McCrary Institute, Worcester Polytechnic Institute, NightVision, and More

Endpoint Security and Network Monitoring News for the Week of May 31

Endpoint Security and Network Monitoring News for the Week of May 31

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of May 31. This curated list features endpoint security and network monitoring vendors such as McCrary Institute, Worcester Polytechnic Institute, NightVision, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Endpoint Security and Network Monitoring News for the Week of May 31

McCrary Institute at Auburn University Adds Six New Senior Fellows

McCrary Institute for Cyber and Critical Infrastructure Security at Auburn University announced this week, it has added six more senior fellows to its 2024 cohort, adding expertise in cybersecurity and national security across government and the private sector. This includes John Katko, Brad Medairy, Christopher D. Roberti, Bradon Rogers, Kiersten Todt, and Bryan Ware. “We are thrilled to have these six esteemed individuals joining the McCrary Institute,” said Frank Cilluffo, director of the institute. “They add considerable expertise to our public policy initiatives and our efforts to strengthen public-private partnerships with their years of experience. From cybercrime to cutting-edge technology to bridging the private-public divide, all of them will help us with our goal to make our country a safer place in light of the new and growing threats we face in cyberspace.” The six new senior fellows join 27 other new senior fellows who were announced in February. Fellows rotate and serve for three years.

Read on for more.

Cequence Becomes First API Security Company to Partner with Aramco Digital

Cequence, an API security solutions provider, this week announced it has signed a memorandum of understanding (MoU) with Aramco Digital Company, Saudi Aramco’s digital and technology subsidiary, to establish plans for a strategic collaboration to enhance and localize API security within the Kingdom of Saudi Arabia. The collaboration aims to propel the digital transformation of Saudi Arabia’s industrial sectors. By implementing Unified API Protection (UAP), it will safeguard critical data and functionality exposed through APIs. It follows the recent launch of Aramco Digital Company, which aims to accelerate digital transformation within the Kingdom, and the Middle East and North Africa (MENA) region. Additionally, the companies will explore creating a “first-of-its-kind” API Protection offering for ADC’s Marketplace.

Read on for more.

WPI Researcher Receives $594,081 to Develop Tools to Protect Hardware From Hackers

This week, Worcester Polytechnic Institute (WPI) researcher Shahin Tajik has been awarded a prestigious CAREER Award of $594,081 by the National Science Foundation to develop new technologies to monitor and protect computer chips and other hardware from malicious attacks. The grant will enable Tajik, assistant professor in the Department of Electrical and Computer Engineering, to expand his research into hardware security, a field that focuses on physical threats to computing systems that attackers can hijack by tampering with chips, motherboards, and other electronic components traveling through global supply chains. “When we talk about computer security, many people will think about hacking attacks that target software vulnerabilities,” Tajik said. “However, computers are made of physical components, and they are vulnerable, too. By tampering with chips and motherboards, attackers can essentially spy on processed data on chips or disrupt the functionality of computer chips. This vulnerability is a critical challenge for businesses, infrastructure operators, and national security.”

Read on for more.

AI-driven RF Planning Tool, Infovista Planet, Now Supports 5G RedCap Network Planning

This week, Infovista unveiled the latest version of its AI-driven RF planning tool, Infovista Planet, which now supports 5G RedCap network planning. This advancement allows operators’ network planning teams to incorporate 3GPP-compliant 5G RedCap devices in their analyses and simulations of 5G Standalone networks. Currently, 17 out of 126 mobile operators investing in 5G Standalone are exploring 5G RedCap for emerging applications, according to the GSA. The updated Infovista Planet also enhances capabilities for planning 5G Fixed Wireless Access (FWA) coverage and capacity. It can now conduct Monte Carlo simulations for both standalone FWA networks and mixed traffic scenarios, including FWA customer premises equipment (CPEs), mobile user equipment (UEs), and RedCap devices. Utilizing Infovista’s expertise from its Ellipse microwave backhaul modeling tool, Planet now offers comprehensive site-to-FWA subscriber analysis for various configurations.

Read on for more.

NightVision Announces New Application Testing Solution

NightVision, an application security (AppSec) solutions provider, this week launched a new software testing and security solution that enables developers to identify, locate, and remediate exploitable vulnerabilities throughout the software development lifecycle (SDLC). “For years, we have failed to provide software developers with testing tools to perform quickly and accurately. The shortcomings of the AppSec market have put us in the software insecurity predicament we find ourselves in today,” said George Prince, CEO of NightVision. “The Secure By Design movement has popularized the concept of making the default route during the SDLC secure by providing safe building blocks for developers. The foundation of these secure defaults should be dynamic testing, prioritizing the risks that are actually exploitable in an application. Our focus is simple: Provide quick and easy guardrails for developers to identify and remediate critical vulnerabilities so they can continue to ship new products and features.”

Read on for more.

Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.


Solutions Review Set to Host Q2 Mini Jam LIVE on June 6th and 7th

From June 6th through the 7th, Solutions Review is hosting their quarterly Insight Jam Mini Jam LIVE event, featuring industry experts and thought leaders gathered for roundtable discussions on a number of panels, including Passkeys: The Great ‘Password Killer’. Access management and authentication solutions providers have been chasing the “password killer” dream since MFA, and right now, passkeys are at the front and have experts on both sides of the discussion answering the question, “Is this the password killer or just another tool in a growing list of tools?

Learn more here.

Enterprise Browsers and The End of the Consumer Web Browser at Work

Anand Oswal of Palo Alto Networks explores how we may be seeing the end of the consumer web browser at work and why the future is in enterprise browsers. The way we work has changed. Organizations, post-pandemic, have shifted to hybrid work models, leading to a rise in the use of personal devices for work. Simultaneously, there’s been a shift to digital (cloud and SaaS) solutions, an increase in contract and gig workers, and, with everything now digitized and interconnected, user expectations have changed to access anything from anywhere from the touch of a screen. This evolution is vastly different from the way the internet and the original web browsers were designed. In the early days, a web browser was used for viewing simple web pages, and has since evolved to include new code languages, speeds, and designs. But security innovations have lagged, turning the web browser from a window into the internet, to instead become a doorway for attackers to access and take advantage of users’ devices and data.

Read on for more.

Share This

Related Posts

Follow Solutions Review