

Jon Gold
Senior Writer
Jon Gold covers IoT and wireless networking for Network World. He can be reached at jon_gold@idg.com.


Palo Alto Networks looks to shore up healthcare IoT security
Machine-learning based visibility and monitoring are at the heart of the cybersecurity company’s new healthcare-focused, add-on application to its core firewall products.

Fortanix unveils AWS integration for centralized key management
Multicloud users have a new option for encryption key management across platforms, with the news that Fortanix has now integrated AWS support.

Financial services increasingly targeted for API-based cyberattacks
API-based attacks are sharply on the rise, as cybercriminals take aim at the financial services industry, according to a new report from Akamai.

Meta outlines US involvement in social media disinformation in new report
The social media giant’s latest quarterly adversarial threat report describes three coordinated disinformation networks, one of which appears to originate from the US.

ForgeRock set to roll out new IAM capabilities designed for the cloud
Automation and AI are the headliners for ForgeRock’s new IAM platform, which aims to simplify an increasingly complex identity and security landscape.

Cohesity previews AI-powered ransomware protection suite, Datahawk
Detection, data management and vaulting are all present in Cohesity’s new Datahawk SaaS application.

Lacework releases cloud-native application security service
The cloud native application protection platform (CNAPP) capability for Lacework’s Polygraph Data Platform offers snapshot analysis of potential attack paths and insights into application workloads.

Okta streamlines IAM portfolio with consumer identity management cloud
Incorporation of Auth0 features and more closely integrated management highlights new cloud-based IAM (identity and access management) system.

Fortanix unveils free DSM Explorer edition for managed data security
A new, free-to-use tier of Fortanix’ data security manager platform is now available.

Qualys previews TotalCloud FlexScan for multicloud security management
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.

Akamai to boost network-layer DDoS protection with new scrubbing centers
Akamai says its Prolexic DDoS protection service will double in capacity thanks to new scrubbing-center buildouts.

Financial losses to synthetic identity-based fraud to double by 2024
Made-up financial identities will cause losses of nearly $2.5 billion, thanks to the prevalence of imposter scams.

Aryaka rolls out cloud-based web gateway for SASE-focused WAN offering
Aryaka's Secure Web Gateway and Firewall-as-a-Service adds cloud-based security services to its Zero Trust WAN platform, as it moves toward providing SASE capabilities for its users.

Tenable aims to unify your cybersecurity with exposure management platform
Tenable tackles the issue of siloed security apps with a cloud-based exposure management system that pulls in data from diverse types of systems that track a company’s digital assets and identify vulnerabilities.

Enterprises embrace devsecops practices against supply chain attacks
Healthy developer-team culture and adherence to devsecops best practices to protect against supply chain attacks are surprisingly commonplace in today’s security environment, according to a report from Google Cloud's DORA research...

Former Broadcom engineer gets eight months in prison for trade secrets theft
Peter Kisang Kim admitted to stealing Broadcom data related to its Trident family of network switching and cloud networking chipsets, while working for a Chinese startup.

Ransomware is (slightly) on the decline, cyberinsurance company says
While ransomware attacks remain highly dangerous, data from a prominent insurer suggests that their frequency and severity is beginning to decline.

API security—and even visibility—isn’t getting handled by enterprises
A new survey highlights the widespread nature of API security incidents and the lack of full inventories of potentially dangerous APIs.

Excess privilege in the cloud is a universal security problem, IBM says
A new report from IBM said that elevated permissions and role identities in the cloud are present in nearly all successful compromises performed by the company’s X-Force Red penetration testing team.