Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

3/1/2016
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Nexusguard Selects Tinfoil Security for Cybersecurity Alliance

Complementary alliance creates a holistic ecosystem to deliver comprehensive cybersecurity

March 01, 2016 08:30 AM Eastern Standard Time

SAN FRANCISCO--(BUSINESS WIRE)--Nexusguard, the worldwide leader in distributed denial of service (DDoS) security solutions, today announced it has entered into a cybersecurity alliance with Tinfoil Security, a leading provider of application vulnerability detection. The relationship unites Nexusguard’s DDoS mitigation capability with Tinfoil’s developer-friendly service that lets security teams quickly scan their applications for vulnerabilities. The move gives customers comprehensive cybersecurity capabilities, with protections designed for the network and application layers.

Enterprise IT deployments face growing threats from countless sources. DDoS attacks continue to pose a significant challenge to network security and organizations’ online presence. However, the challenges extend far beyond just denial of service attacks. Intrusions and application vulnerabilities cause significant problems for IT security, as well. Companies need both elements of security to confidently address the existing threat landscape.

“Companies are fighting a war on multiple fronts. One of the best solutions is to ally against these developing threats to provide the best coverage,” Michael Borohovski, co-founder and chief technology officer for Tinfoil Security. “Finding vulnerabilities at the application layer is important, certainly – yet we believe there is a greater opportunity to do even more. Working with Nexusguard enables us to give companies a stronger defense against the threats they face every day.”

“As businesses work to overcome new zero-day threats in cyber attacks, we see increasing demand for best-in-breed technology,” Xenophon Giannis, vice president for Nexusguard, explains. “Our alliance with Tinfoil Security empowers customers access to an industry-leading service to tackle any form of intrusion or attack. A holistic security ecosystem gives businesses the comprehensive cybersecurity advantage required for today’s digital world.”

Nexusguard will be at RSA 2016 to discuss new solutions for cybersecurity protection. Visit Nexusguard in booth N5010. For more information, contact: [email protected].

About Nexusguard

Founded in 2008, Nexusguard is the global leader in fighting malicious Internet attacks. Nexusguard protects clients against a multitude of threats, including distributed denial of service (DDoS) attacks, to ensure uninterrupted Internet service. Nexusguard provides comprehensive, highly customized solutions for customers of all sizes, across a range of industries, and also enables turnkey anti-DDoS solutions for service providers. Nexusguard delivers on its promise to maximize peace of mind by minimizing threats and improving uptime. Headquartered in San Francisco, Nexusguard’s network of security experts extends globally. Visit www.nexusguard.com for more information.

About Tinfoil Security

Tinfoil Security provides security for DevOps, through an easy to use, developer friendly service that lets you scan your web application or API for vulnerabilities and fix them quickly. We're a team of experts with extensive backgrounds in security across many organizations. We focus on creating simple, usable security products and providing the best security on the market. We streamline the security process and focus on developers, providing the first line of security tools that easily integrate into the DevOps and development processes. Tinfoil was founded in 2011 by Ainsley Braun and Michael Borohovski, two MIT and intelligence community alumni who were tired of seeing their own information insecure on the Internet. Visit https://www.tinfoilsecurity.com/ for more information.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1448
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
CVE-2020-1449
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.
CVE-2020-1450
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1451, CVE-2020-1456.
CVE-2020-1451
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1456.
CVE-2020-1454
PUBLISHED: 2020-07-14
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Re...