The Waratek Application Security Platform relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java. Find out how the new technology worked in CSO magazine.
It’s clear that BlackBerry is attempting to recapture some of it’s past glory with the KEYone, while also addressing their historical shortcomings. I was able to spend some time evaluating it for government suitability.
SecBI has fielded new software that aims to eliminate the burden of processing billions of traffic logs per month manually, and they did it without using any network taps. Come to CSO Magazine to find out how SecBI solved this tricky problem in an exclusive review of the new product.
CSO Magazine is turning up the heat on cybersecurity, diving into reviews of the latest cyber defenses in critical categories as part of a summer reviews blitz. Find out how the latest products in deception, microsegmentation, network traffic analysis and others stack up.
A new type of environmentally aware malware knows how to look for key indicators to prove that its running inside a sandbox. The Minerva tool we tested for CSO Magazine actually feeds it those prompts, tricking the malware to sleep or kill itself.
We tested the Netgear ReadyNAS 314 for BizTech, finding a sturdy workhorse for file storage, that also automatically squashed bugs before they could be permanently written.
New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. Network World asked TWB author John Breeden II to test out several manager programs designed to focus the chaos of a typical firewall deployment.
What if there was a different way to look at security? Instead of searching for behaviors that might indicate a threat, what if you could tightly define everything that was allowed within a network? Varmour does that. It’s called segmentation, and is the subject of a Network World Clear Test review.
What if you assumed that APTs were already hiding in your network and launched software specifically designed to hunt them down? Network World reviewed the latest tools in the cybersecurity arsenal: threat hunting platforms. Load up some extra ammo, because we are going hunting for our latest roundup, and there’s lots of game to be had.
The SafeBreach continuous security validation platform simulates how specific networks are vulnerable to attack, and how to plug what is likely quite a few holes in existing defenses. Read the Network World testing and review.