There are two strategic elements to the platform: One is that Dell considers mid-market security to be an underserved market. The other is that endpoints are particularly vulnerable.
Ed Meyercord noted a customer win against Huawei and said security concerns about the Chinese vendor are “creating an opportunity for us in the marketplace.”
“We joke that our goal is to have the CIA run sensitive applications in China on Ali Cloud,” using Fortanix security software, CEO Ambuj Kumar says.
The products are focused on managed endpoint detection and response, enhanced EDR 4.0, endpoint protection, and hardening capabilities.
One analyst called the announcement “brilliant” because it is designed to help enterprise IT shops deal with “IoT havoc as the network edge is now stretched to the last connected device.”
Rami Rahim said new products, including an MX line card targeting carrier 5G deployments, a new 400G platform, and silicon photonics capabilities, will return Juniper to growth during the second half of the year.
Job site Indeed found that listings for “data scientist" have surged 344 percent over the past five years.
The partnership also allows Cumulus to battle Cisco. “That’s what we do everyday, and having a better story for Nutanix customers is just one more way to do that,” Cumulus CEO Josh Leslie says.
It sounds similar to VMware’s “NSX everywhere” push, which seeks to stretch that vendor’s networking and security capabilities from data centers to clouds and the edge.
Cisco discovered a number of vulnerabilities affecting devices that connect to its SD-WAN software. This includes one critical security flaw to its vController software.
ExtraHop CEO Arif Kareem is also positioning the software provider for an IPO in the next 24 months. But he’s quick to add, “that’s not our end goal.”
The one-year delay is because initial 5G network launches are using the non-standalone architecture that relies on already deployed 4G LTE evolved packet core technology.
Thoma Bravo, the private equity firm rumored to want to buy McAfee, spent billions scooping up security companies in 2018. It also approached Symantec about acquiring that company.
China and Russia were responsible for almost half of the incident response episodes.
Threat researchers at Netskope and McAfee this week described new and potentially dangerous networking vulnerabilities.
The new group’s list of founding members reads like a who’s who of chipmakers, telecommunications companies, cloud providers, edge infrastructure vendors, and others.
HTTP is the application protocol that powers the Web. It began life as the so-called HTTP/0.9 protocol in 1991, and by 1999 had evolved to HTTP/1.1, which was standardised within the IETF (Internet Engineering Task Force). HTTP/1.1 was good enough for a long time but the ever changing needs of the Web called for a better suited protocol, and HTTP/2 emerged in 2015. More recently it was announced that the IETF is intending to deliver a new version - HTTP/3. To some people this is a surprise and has caused a bit of confusion. If you don't track IETF work closely it might seem that HTTP/3 has come out of the blue. However, we can trace its origins through a lineage of experiments and evolution of Web protocols; specifically the QUIC transport protocol.
If you're not familiar with QUIC, my colleagues have done a great job of tackling different angles. John's blog describes some of the real-world annoyances of today's HTTP, Alessandro's blog tackles the nitty-gritty transport layer details, and Nick's blog covers how to get hands on with some testing. We've collected these and more at https://cloudflare-quic.com. And if that tickles your fancy, be sure Continue reading
StackRox updated its container security platform with additional visibility, profiling, and network management features.
Check your domain registration and protect those logins
The post Emergency Directive 19-01, DNS 2FA suggested appeared first on EtherealMind.