Date | Title | Description |
16.07.2024 | Aryaka Closes Fiscal Year '24 Strong - with New Bookings Up 34% YoY and Security Solution Sales up 80% | Growth fueled by launch of Unified SASE as a Service, marquee customer wins and key executive appointments
SANTA CLARA, Calif., July 16, 2024 /PRNewswire/ -- Aryaka®, the leader in and first to deliver Unified SASE as a Service, today annou... |
27.01.2017 | 5 Best Practices for Keeping Your Business Safe From Hackers | This article originally appeared on Entrepreneur.
Designing and implementing a strategy for enterprise security is highly important and should be prioritized as the world becomes more dependent on technology.
According to a report by IBM (I... |
06.01.2017 | 5 Fundamental Best Practices for Enterprise Security | January 6, 2017 7 min read
Opinions expressed by Entrepreneur contributors are their own.
Designing and implementing a strategy for enterprise security is highly important and should be prioritized as the world becomes more dependent on tec... |
02.09.2016 | What if cybersecurity followed physics? | Ron Moritz Contributor
Ron Moritz is a founding partner of cybersecurity technology due diligence firm TrueBit Cyber Partners and cybersecurity venture partner with equity crowdfunding firm OurCrowd.
The first cybersecurity unicorn kernel p... |
15.08.2016 | Metapacket analyzes outbound network traffic to flag and block malware | Metapacket, one of YC’s current batch of startups, is hoping to get its SaaS on corporates’ list of essential threat detection software with a technique to stop malware attacks by analyzing outbound network traffic to determine whether it’s... |
27.06.2016 | As Symantec flexes its muscle in security, who will step up to the challenge? | Mahendra Ramsinghani Contributor
Mahendra Ramsinghani founded Secure Octane Investments, which includes Demisto, CyberGRX and 16 other infrastructure and cybersecurity companies. Mahendra authored "The Business of Venture Capital"... |
18.06.2016 | M&A roundup - week ending 6/18/16 | Microsoft bought LinkedIn; Pinterest acquired Fleksy; Bed Bath and Beyond purchased One Kings Lane
Microsoft acquired LinkedIn. The purchase price was for $196 per share, or 45 percent above LinkedIn's price before the deal was announced, a... |
13.06.2016 | Symantec grabs Blue Coat Systems for $4.65 billion | Symantec announced overnight it had purchased Blue Coat Systems for $4.65 billion with the hopes of creating an enterprise security juggernaut.
As part of the deal, Blue Coat CEO Greg Clark will take over the same role at Symantec . The com... |
13.06.2016 | Symantec to Acquire Web Security Company Blue Coat, for approx. $4.65 Billion | Symantec (NASDAQ:SYMC) is to acquire web security company Blue Coat, Inc., for approximately $4.651 billion in cash.
The transaction has been approved by the Boards of Directors of both companies and is expected to close in the third calend... |
09.06.2016 | European workers use cloud services for whistle blowing | Wait until you hear what employees in Europe are using cloud services for. Oh, boy.
Blue Coat Systems has polled more than 3,000 workers in France, Germany and the UK, asking them about their cloud usage habits, and, as it turns out, some e... |
26.04.2016 | New Android Ransomware Infects Phones When Users Visit A Certain Website | Jem Gezen, Tech Times 26 April 2016, 07:04 am
Security and networking company Blue Coat has discovered a new piece of ransomware that can silently attack an Android phone without any user interaction. Unlike other Android malware, which is ... |
26.04.2016 | Attackers use Hacking Team exploit to drop ransomware | Attackers are actively using an exploit leaked last year from Italian spyware vendor Hacking Team to install ransomware that locks users out of their Android devices, researchers have discovered.
Security vendor Blue Coat and Zimperium anal... |
25.04.2016 | Active drive-by exploits critical Android bugs, care of Hacking Team | Enlarge
Blue Coat reader comments 99 with 53 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
An ongoing drive-by attack is forcing ransomware onto Android smartphones by exploiting critical vulnerab... |
13.01.2016 | Daily funding roundup - January 13, 2016 | Zerto secured $50M; Syros Pharmaceuticals closed $40M financing; Shape Security raised $25M funding
Bolste, provider of a business collaboration platform, announced today that it is launching its business operating system (BOS) one month af... |
21.12.2015 | Bit9 + Carbon Black and Blue Coat Partner to Integrate Next-Generation Endpoint Security with Network Security | WALTHAM, Mass. and SUNNYVALE, Calif.—December 21, 2015—Bit9® + Carbon Black®, the leader in Next-Generation Endpoint Security (NGES), and Blue Coat Systems, Inc., a market leader in enterprise security, today announced Bit9 + Carbon Black h... |
10.11.2015 | Blue Coat Systems to Acquire Elastica for $280M | Blue Coat Systems, Inc., a Sunnyvale, CA-based enterprise security platform provider, is to acquire Elastica, Inc., a San Jose, CA-based cloud application security platform, for $280m.
The acquisition of Elastica allows Blue Coat to offer a... |
07.11.2015 | Blue Coat acquires cloud security startup Elastica for $280M (Updated) | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Update at 9:06 a.m. Pacific on Monday, November 7... |
07.11.2015 | Blue Coat acquires cloud security startup Elastica for $280M (Updated) | Update at 9:06 a.m. Pacific on Monday, November 7: Blue Coat has just announced the acquisition. The company paid $280 million for Elastica, not more than $300 million, according to a statement.
Blue Coat Systems, a security vendor owned by... |
03.09.2015 | Many new top-level domains have become Internet’s “bad neighborhoods” [Updated] | So your domain is about zip? That's mighty suspicious.
Enom reader comments 110 with 73 posters participating, including story author
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
There were many who warned that the In... |
01.09.2015 | Study: 100% of Websites in These Two Top-Level Domains Are 'Shady' | The recent expansion of top-level domains (TLDs) has created fertile ground for cyber scammers, according to a study published on Tuesday by security company Blue Coat.
Blue Coat analyzed tens of millions of websites and found that 95 perce... |
26.08.2015 | Big Data’s Big Risks That No One’s Talking About | Big Data is causing a big stir in all kinds of circles from business to science, and for good reason: it could open up many new tools for many different types of insight. However, there is also a lot of risk bundled in with using large data... |
17.12.2014 | Security firm Edgewave nabs $8M to help smaller businesses track threats | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cyber security firm Edgewave, has raised another ... |
17.12.2014 | Security firm Edgewave nabs $8M to help smaller businesses track threats | Cyber security firm Edgewave, has raised another $2 million in funding, bringing its total Series A round to $8 million.
Edgewave brings cloud-based threat analysis to small and medium businesses that traditionally can’t afford to hire it’s... |
10.12.2014 | Nation-backed malware targets diplomats’ iPhones, Androids, and PCs | Wikipedia reader comments 44 with 29 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Researchers have uncovered yet another international espionage campaign that's so sophisticated and comprehensive... |
23.10.2014 | Moving beyond fear with business assurance technology | By Heather Wright
Contributor
Thu, 23rd Oct 2014
#
Cybersecurity
#
Blue Coat
#
IT Distributors
#
Westcon-Comstor
#
WGImagine14
FYI, this story is more than a year old
Westcon Imagine 2014 - Security technology can focus on prevention and pr... |
11.11.2013 | Merge ahead? Why it’s not time to converge your networks | Merging all your IP networks may make financial sense at first, but it could cause your most important apps to crash.
Paul Goyette reader comments 32 with 28 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on... |
22.05.2013 | Blue Coat Buys Intel-Backed Solera Networks To Beef Up In Big Data, Encrypted Data Security | Web security provider Blue Coat Systems — itself acquired in a $1.3 billion deal by Thoma Bravo at the end of December 2011 — is making an acquisition today: it’s buying Solera Networks, a specialist in big data security, for an undisclosed... |
14.02.2013 | Where Has All The Mobile Malware Gone? | Remember when everyone used to run Windows? Hardly a week went by when a friend or colleague lobotomized their machine with a virus. Some of this may have been a matter of Microsoft’s architecture, but much of it came down to Windows being ... |
16.01.2013 | Report finds growing use of US surveillance gear by repressive nations | reader comments 21 with 19 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Human rights monitors have documented the use of US-manufactured Internet surveillance and censorship gear in 21 countries,... |
07.01.2013 | How tech companies and the U.S. military are blocking gay websites | Today, the Gay and Lesbian Alliance Against Defamation (GLAAD) is taking aim at the U.S. Department of Defense and a handful of tech companies that block access to websites with LGBT content.
We’re not talking about adult content here; we’r... |
03.04.2012 | Blue Coat Protects IPv6 Networks With New PacketShaper | Blue Coat today has announced PacketShaper 9, a new software operating system release for Blue Coat PacketShaper appliances. The update introduces the industry’s first application- and content-level visibility and control for IPv6 “shadow n... |
09.12.2011 | Blue Coat Systems bought for $1.3B in cash | Thoma Bravo pays 50% premium, or $25.81 per share, for Web security software acquisition
A group of investors led by private equity firm Thoma Bravo confirmed Friday that it is acquiring the Web security and WAN optimization solutions compa... |
09.12.2011 | Investor Group Buys Web Security Company Blue Coat For $1.3 Billion In Cash | Blue Coat, which specializes in Web security and WAN optimization solutions, has agreed to be acquired by an investor group led by San Francisco-based PE firm Thoma Bravo in a transaction valued at roughly $1.3 billion.
Shareholders stand t... |
12.09.2011 | The Downside of Web 2.0 Caching | If you are trying to implement a content caching solution on your enterprise network, you know that serving up dynamic content is a cat-and-mouse game. The major Web content delivery sites want to deliver fresh content, and you want to try ... |
30.07.2011 | A Review of Browser Anti-Phishing Protection | Who among us hasn’t received an email recently telling us to click a link to update our email account info, provide corrected banking login details, update our credit card information on file, and what-have-you? Most of you are savvy enough... |
28.07.2011 | Where Does Your Malware Come From? [Infographic] | Where does your malware come from? How does it get to your computer? It is not like there is some magical, malicious stork that comes and drops off some demented baby into your operating system that makes it join a botnet at knife point. Th... |
27.07.2011 | A Look At The Size, Shape And Growing Threat Of Malware Networks [Infographic] | Blue Coat Systems, the provider of web security and speed optimization solutions, released a mid-year web security report earlier this month, which, among other things, examined the current state of malware ecosystems, and detailed the grow... |
06.07.2011 | Search Engine Poisoning #1 Vector for Malware | Search engine poisoning is the most prevalent form of malware delivery on the Web, according to the security researchers at Blue Coat. In its 2011 Mid-Year Security Report Blue Coat outlined the biggest threats to Web security and the attac... |
09.09.2010 | What You Need to Know About Malvertising | On September 14, 2009 New York Times readers were automatically redirected to a site hosting malmare thanks to an ad containing malicious code. On July 15 2010, TweetMeme was the victim of a similar attack and began sending its users to a “... |
23.03.2010 | DEMO: Teneros offers companies a way to track employees on social networks with Social Sentry | Teneros is one of 65 companies chosen by VentureBeat to launch at the DEMO Spring 2010 event taking place this week. These companies do pay a fee to present, but our coverage of them remains objective.
Teneros’s Social Sentry may just be th... |
- | Creepy new Android ransomware installs itself, demands payment in iTunes gift cards | This brand new Android threat might not affect a large number of users, but it deserves some attention considering its ingenuity. Unlike other malware threats that need to fool the user to install them, this new ransomware-like attack does ... |