Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

02:00 PM
Dark Reading
Dark Reading
Products and Releases

Nexusguard Selects Tinfoil Security for Cybersecurity Alliance

Complementary alliance creates a holistic ecosystem to deliver comprehensive cybersecurity

March 01, 2016 08:30 AM Eastern Standard Time

SAN FRANCISCO--(BUSINESS WIRE)--Nexusguard, the worldwide leader in distributed denial of service (DDoS) security solutions, today announced it has entered into a cybersecurity alliance with Tinfoil Security, a leading provider of application vulnerability detection. The relationship unites Nexusguard’s DDoS mitigation capability with Tinfoil’s developer-friendly service that lets security teams quickly scan their applications for vulnerabilities. The move gives customers comprehensive cybersecurity capabilities, with protections designed for the network and application layers.

Enterprise IT deployments face growing threats from countless sources. DDoS attacks continue to pose a significant challenge to network security and organizations’ online presence. However, the challenges extend far beyond just denial of service attacks. Intrusions and application vulnerabilities cause significant problems for IT security, as well. Companies need both elements of security to confidently address the existing threat landscape.

“Companies are fighting a war on multiple fronts. One of the best solutions is to ally against these developing threats to provide the best coverage,” Michael Borohovski, co-founder and chief technology officer for Tinfoil Security. “Finding vulnerabilities at the application layer is important, certainly – yet we believe there is a greater opportunity to do even more. Working with Nexusguard enables us to give companies a stronger defense against the threats they face every day.”

“As businesses work to overcome new zero-day threats in cyber attacks, we see increasing demand for best-in-breed technology,” Xenophon Giannis, vice president for Nexusguard, explains. “Our alliance with Tinfoil Security empowers customers access to an industry-leading service to tackle any form of intrusion or attack. A holistic security ecosystem gives businesses the comprehensive cybersecurity advantage required for today’s digital world.”

Nexusguard will be at RSA 2016 to discuss new solutions for cybersecurity protection. Visit Nexusguard in booth N5010. For more information, contact: [email protected].

About Nexusguard

Founded in 2008, Nexusguard is the global leader in fighting malicious Internet attacks. Nexusguard protects clients against a multitude of threats, including distributed denial of service (DDoS) attacks, to ensure uninterrupted Internet service. Nexusguard provides comprehensive, highly customized solutions for customers of all sizes, across a range of industries, and also enables turnkey anti-DDoS solutions for service providers. Nexusguard delivers on its promise to maximize peace of mind by minimizing threats and improving uptime. Headquartered in San Francisco, Nexusguard’s network of security experts extends globally. Visit www.nexusguard.com for more information.

About Tinfoil Security

Tinfoil Security provides security for DevOps, through an easy to use, developer friendly service that lets you scan your web application or API for vulnerabilities and fix them quickly. We're a team of experts with extensive backgrounds in security across many organizations. We focus on creating simple, usable security products and providing the best security on the market. We streamline the security process and focus on developers, providing the first line of security tools that easily integrate into the DevOps and development processes. Tinfoil was founded in 2011 by Ainsley Braun and Michael Borohovski, two MIT and intelligence community alumni who were tired of seeing their own information insecure on the Internet. Visit https://www.tinfoilsecurity.com/ for more information.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.
PUBLISHED: 2019-11-18
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which m...
PUBLISHED: 2019-11-18
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.