If you are part of a distributed team (aren’t we all these days) or agile development team, you, your team, company probably do or have done demos at one point. Demos are an amazingly valuable part of the development process for the company, especially given that most of us are now working remotely. At Tempered, we constantly innovate and never stop thinking of ways to make our product even better. We started demos Fridays; it allows us to connect to the product team and everyone in the company. Demo Fridays provide a space for us to communicate what we’re working on, get instant feedback on new features, and collect priceless insights from the rest of the team.
We're pushing out a new product update this week. Some notable mentions include Airwall Agents now available for Raspbian and Ubuntu ARM64, and new and improved Conductor features.
Today, Tempered Networks is sharing a pair of exciting announcements: a new technology partnership with Nozomi Networks, and a new release of our Airwall Zero Trust Software Defined Perimeter platform. The latest release, version 2.2.11, focuses on increasing visibility and control of traffic in the Airwall network, and flexibility of deployment. It also features an integration with Nozomi.
Water treatment and Sewage treatment plants are arguably the most vulnerable critical infrastructure in the United States.
2020 brought great challenges to companies as well as individuals. We’re proud to have been able to help a growing number of organizations improve their security posture and resiliency. While energy providers and municipalities continue to rely on Tempered, we’re also seeing increased activity in the healthcare sector. The rising scourge of ransomware and the highly vulnerable state of medical devices have proven to be key concerns.
Legendary security technologist, Bruce Schneier, recently wrote an article in The Guardian summarizing the impact of the SolarWinds security breach last month, and it’s probably a lot worse than people think. (The breach that is, the article was great!). If you don’t know the gory details of the attack, our CTO, Bryan Skene, covered it nicely here. Schneier was also quoted in an earlier analysis of the hack by noting how extensive the breach was throughout many of our nation’s most sensitive military and industrial networks, and, in fact, the extent of the compromise in each network, or how many networks, may not be known for years.