Pioneering cybersecurity start-up, Barac, today announced it has extended the capabilities of its Encrypted Traffic Visibility Platform to support version 1.3 of the Transport Layer Security (TLS) specification. Using the Barac platform, enterprises can detect and block malware hidden inside encrypted traffic without the need for decryption. This new capability plugs a critical and emerging …

by admin

Etiam mattis ligula et diam tempus rutrum. Donec pulvinar posuere lorem sit amet hendrerit. In hac habitasse platea dictumst. Integer porta odio in gravida malesuada. Integer pharetra lacinia lacus, nec interdum ipsum vestibulum at. Aenean non ex non nisl malesuada bibendum. Integer molestie molestie massa, non blandit est viverra nec. Morbi et erat eget augue …

by admin

London, UK, 15 January 2019 – Pioneering cybersecurity start-up, Barac, today announced it is ramping up operations with the appointment of Peter Christou as its first EVP Global Sales and by expanding into the US market with the opening of a Boston office. Christou, an experienced cybersecurity professional, has been appointed to drive growth through …

by admin

The Decryption Problem As organizations continue to move to the cloud, increase their utilization of APIs and adopt evermore complex and sensitive systems – and as they incorporate more mobile third party applications and IoT devices into their networks – they find themselves with increasingly complex multi-cloud architectures. As a result, web and application-based traffic volumes are …

by admin

Barac joins GCHQ’s Cyber Accelerator programme We’re excited to announce that Barac has been chosen to join GCHQ’s prestigious Cyber Accelerator programme. The programme, run by GCHQ’s National Cyber Security Centre, supports cyber security start-ups and helps them to bring to market new products that are ‘better, faster and cheaper’ than existing cyber security products. …

by admin

Barac Encrypted Traffic Visibility (ETV) Platform assists in the monitoring and meeting of compliance standards

by admin

Cryptocurrencies attract the attention of some of the world’s most opportunistic hackers. This week (March 12, 2018), we found a new type of a very smart crypto hack on Unix/Linux operating systems that is targeting virtual machines on Azure cloud to mine cryptocurrency. A new cryptocurrency mining hack is targeting continuous deployment technology Jenkins, changing …

by admin

Metadata has been in the news over the last couple of years. The term has been used by businesses and government ministers but there doesn’t seem to be a consensus about what metadata actually is and how to can be used. Metadata is simply data. “Metadata is summary information about data. Think of a photograph …

by admin

The rapid rise in encrypted traffic is changing the security landscape. As more organizations become digital, an increasing number of services and applications are using encryption as a primary method of securing information. Encrypted traffic has increased by more than 90 percent year over year, with more than 40 percent of websites encrypting traffic in …

by admin

Welcome to our new website. This is your first post and we will keep you updated about the amazing things that we are doing @barac.

by admin