Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

12/9/2019
11:30 AM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

10 Notable Cybersecurity Acquisitions of 2019, Part 2

As mergers and acquisitions continued to shape the security industry throughout 2019, these deals were most significant.
2 of 10

VMware Buys Carbon Black
VMware offered $2.1 billion to buy endpoint security vendor Carbon Black in August. The deal is considered by many security experts to be among the most significant this year. 
'VMware is so focused on the cloud that I think it's natural for them to want to bring on a security [company] to accelerate people's journey to the cloud,' says Thomas. 
At a time when organizations are grappling with too many security tools and not enough people to handle them, many are seeking new ways to maximize efficiency in their existing products.
'All these things are creating sort of an inflection point in the security market,' says Nick Lantuh, president and CEO at Fidelis Cybersecurity. 'There's a desire to have more visibility from a holistic standpoint,' and work with security vendors that are more strategic in their platform. The trend is moving away from buying several 'best of breed' point products and toward investing in fewer, more comprehensive security tools.
(Image: VMware)

VMware Buys Carbon Black

VMware offered $2.1 billion to buy endpoint security vendor Carbon Black in August. The deal is considered by many security experts to be among the most significant this year.

"VMware is so focused on the cloud that I think it's natural for them to want to bring on a security [company] to accelerate people's journey to the cloud," says Thomas.

At a time when organizations are grappling with too many security tools and not enough people to handle them, many are seeking new ways to maximize efficiency in their existing products.

"All these things are creating sort of an inflection point in the security market," says Nick Lantuh, president and CEO at Fidelis Cybersecurity. "There's a desire to have more visibility from a holistic standpoint," and work with security vendors that are more strategic in their platform. The trend is moving away from buying several "best of breed" point products and toward investing in fewer, more comprehensive security tools.

(Image: VMware)

2 of 10
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0565
PUBLISHED: 2020-02-25
NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.
CVE-2020-9393
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows XSS.
CVE-2020-9394
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows CSRF.
CVE-2019-3999
PUBLISHED: 2020-02-25
Improper neutralization of special elements used in an OS command in Druva inSync Windows Client 6.5.0 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
CVE-2020-8809
PUBLISHED: 2020-02-25
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker ...