article thumbnail

Zscaler Data Security Platform Takes on Symantec, CASB Tools

Data Breach Today

CEO Jay Chaudhry: In-Line Inspection, App-to-App Protection Aid Data Defense Growth Zscaler's ability to inspect traffic in-line and secure application-to-application communications has driven massive growth in its data protection business, CEO Jay Chaudhry said.

Security 292
article thumbnail

RSAC Fireside Chat: Dispersive adapts WWII radio-signal masking tool to obfuscating network traffic

The Last Watchdog

Here what Plimplaskar told me: “We’re leveraging spread spectrum concepts in terms of how conventional TCP/IP and UDP type of traffic is communicated between users and sites, cloud estates and sites and amongst each other. We take the information of value and split it across multiple streams.

130
130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NSA releases guidance for securing Unified Communications and VVoIP

Security Affairs

The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last week released guidance for securing their communication systems, specifically Unified Communications (UC) and Voice and Video over IP (VVoIP).

article thumbnail

MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era

The Last Watchdog

It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real Fresh evidence comes from Mimecast’s “The State of Email and Collaboration Security” 2024 report.

Security 211
article thumbnail

Top 5 Application Security Tools & Software for 2023

eSecurity Planet

Application security tools and software solutions are designed to identify and mitigate vulnerabilities and threats in software applications. These tools play a vital role in ensuring the security, integrity, and confidentiality of sensitive information, such as personal data and financial records.

Security 103
article thumbnail

GUEST ESSAY: Marshaling automated cybersecurity tools to defend automated attacks

The Last Watchdog

Cybersecurity tools evolve towards leveraging machine learning (ML) and artificial intelligence (AI) at ever deeper levels, and that’s of course a good thing. Sophisticated tools were employed to auto generate content that compelled users to respond. Related: Business logic hacks plague websites. Accelerate time-sensitive processes.

article thumbnail

Security Training: Moving on from Nick Burns Through Better Communication

eSecurity Planet

A recent experience highlighted that security awareness training and most alerts to users about unsafe practices may be making the error of being too general. An alert came in one morning about a security alert generated by my device. Some in IT are ill-suited to helping users understand security-specific information.