logo

CDNetworks Named a Key WAF & Cloud Security Provider in ITR's 2025 Japan Cyber Security Market Report

Zawya24-07-2025
SINGAPORE - Media OutReach Newswire - 24 July 2025 - CDNetworks, the APAC-leading network to deliver edge as a service, today announced that it has been recognized as one of the key WAF & Cloud Security providers in Japan's cybersecurity market, according to the ITR Market View: Cyber Security Solutions Market 2025, a market survey report published by ITR Corporation, Japan's leading IT market research authority.
This acknowledgment reinforces CDNetworks' strong position in Japan's cloud security landscape and underscores the trust that local enterprises place in its ability to deliver comprehensive, tailored security solutions amid an increasingly complex threat environment.
" As Japanese enterprises look to strengthen their network security posture, many struggle with limited in-house expertise," said Antony Li, APAC Head of Sales at CDNetworks. "This makes having a trusted partner—one with decades of experience and intelligent, easy-to-operate solutions—more critical than ever to simplify operations and mitigate risk. We're honored that ITR has recognized our commitment by naming us a key WAF and Cloud Security provider in Japan."
CDNetworks' flagship solution, Cloud Security 2.0, integrates advanced AI and machine learning with a cloud-native architecture, delivering multi-layered protection through DDoS Protection, Web Application Firewall (WAF), Bot Management, and API Security—all unified on a single platform. These core capabilities are powerfully enhanced by an AI Engine that continuously analyzes traffic, identifies anomalies, and autonomously adapts to defend against emerging threats, helping enterprises stay ahead of attackers.
To learn more about CDNetworks' Cloud Security 2.0, please visit here.
Hashtag: #CDNetworks #CyberSecurity #WAF #CloudSecurity
https://www.cdnetworks.com/
https://www.linkedin.com/company/cdnetworks/
https://twitter.com/cdnetworks
https://www.facebook.com/CDNetworks-156678131058653/
The issuer is solely responsible for the content of this announcement.
CDNetworks
As the APAC-leading network with over 2,800 global Points of Presence and more than 20 years of technology experience, CDNetworks delivers the fastest and most secure digital experiences to end users. Our diverse products and services include web performance, media delivery, cloud security, edge computing, zero-trust security, and colocation services — all designed to spur business innovation.
To learn more, visit cdnetworks.com and follow us on LinkedIn.
CDNetworks
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

BOJ gears up to hike rates again but leaves free hand on timing
BOJ gears up to hike rates again but leaves free hand on timing

Khaleej Times

time6 hours ago

  • Khaleej Times

BOJ gears up to hike rates again but leaves free hand on timing

The Bank of Japan laid the groundwork last week for resuming interest rate hikes by spelling out explicitly for the first time the risks that persistent food price rises fan broad-based inflation. While markets took a dovish reading of BOJ Governor Kazuo Ueda's commentary after Thursday's policy meeting, much of his guidance suggests the bank is inching back towards action after a period of waiting and watching, analysts say. A shift in the board's inflation bias and its less gloomy view on the impact of U.S. tariffs also underscore the BOJ's resolve to pull the trigger once it is convinced the damage from higher levies will be within its expectations. Such hawkish signals in the BOJ's quarterly report, which represents the board's consensus view on the policy outlook, were qualified by Ueda's comments suggesting he was in no rush to raise interest rates. Still, Ueda said Japan was making some progress towards durably hitting the BOJ's 2% inflation target and stressed that its policy rate - at 0.5% - remains very low. "It's not as if we will wait until underlying inflation is firmly at 2%. Our decision is dependent on how likely underlying inflation will reach that level," Ueda told a news conference on Thursday when asked about the next rate-hike timing. All in all, the signals show the BOJ is preparing for another rate hike, while leaving all options open on the exact timing, analysts say. "The outlook report clearly shows the BOJ is starting to lay the groundwork for a rate hike," said Naomi Muguruma, chief bond strategist at Mitsubishi UFJ Morgan Stanley Securities. "The BOJ seems confident about prospects for durably hitting its inflation target," she said. "It may not be in a rush, but signaling that every policy meeting from now will be live." The BOJ holds its next policy meeting in September and another in October, when the board conducts a quarterly review of growth and price forecasts. It holds its final meeting for this year in December. A Reuters poll last month showed a majority of economists expect another rate hike by year-end. Swap rates indicate a 54% chance the BOJ will raise rates to 0.75% in October and a 71% chance in December. Second round effects When the BOJ compiled its previous outlook report on May 1, Ueda signalled a pause in its rate-hike cycle as President Donald Trump's April announcement of sweeping "reciprocal" tariffs jolted markets and stoked fears of global recession. Thursday's report showed signs the BOJ has ended that pause, as markets restored some calm and Japan's trade agreement with the U.S. in July reduced some uncertainty. For one, the BOJ removed the word "extremely" in describing uncertainty over U.S. trade policy. While Ueda stressed the need to await more data on the impact from U.S. tariffs, he said the risk of the economy "falling off the cliff" has diminished. The board also revised up its inflation forecast and said risks to the price outlook were balanced - a more neutral stance from that of May 1 describing risks as skewed to the downside. Furthermore, the BOJ report for the first time included a detailed assessment of how rising food costs - once seen as transitory - may lead to broad-based price rises. "It is possible that price rises will persist for longer than expected" as companies are passing on not just raw material but labour and distribution costs, the report said. A steady rise in the price of items like food, which consumers buy frequently, may induce "second-round effects" on underlying inflation, the BOJ said in the strongest warning to date on mounting price pressure. To be sure, food prices are among several factors the BOJ looks at in judging whether underlying inflation - or price rises driven by domestic demand - will durably hit its 2% target and justify raising rates. Other measures show underlying inflation remains short of 2%, Ueda said, brushing aside the view the BOJ may be behind the curve in addressing the risk of too-high inflation. But he said the BOJ must keep an eye out on how food prices and headline consumer inflation, which has remained above its target for well over three years, could affect inflation expectations. In exiting a decade-long stimulus last year and raising rates to 0.5% in January, the BOJ pointed to growing signs companies were shedding their long-held aversion to price hikes. Such change in corporate behaviour may be accelerating. A total of 1,010 food and beverage items saw prices rise in August with more than 3,000 items likely to see higher prices in October, think tank Teikoku Databank said on Thursday. "Food inflation will undoubtedly persist, which is probably why the BOJ highlighted the risk so clearly in the report," said veteran BOJ watcher Mari Iwashita. "Once there's more clarity that wage hikes will continue, the BOJ might go ahead and raise rates."

Kaspersky discovered cyberattacks that sourced information from GitHub, Quora and social networks to target organizations
Kaspersky discovered cyberattacks that sourced information from GitHub, Quora and social networks to target organizations

Zawya

time6 hours ago

  • Zawya

Kaspersky discovered cyberattacks that sourced information from GitHub, Quora and social networks to target organizations

Kaspersky detected a complex attack sequence that involved retrieving information from legitimate services such as GitHub, Microsoft Learn Challenge, Quora, and social networks. The attackers did this to avoid detection and run an execution chain to launch Cobalt Strike Beacon, a tool to remotely control computers, execute commands, steal data, and maintain persistent access within a network. The attacks were detected in the second half of 2024 in organizations across China, Japan, Malaysia, Peru and Russia, and persisted into 2025. The majority of victims were large to medium-sized businesses. To infiltrate victims' devices, the attackers sent spear phishing emails which were disguised as legitimate communications from major state-owned companies, particularly within the oil and gas sector. The text was phrased to look like there was interest in products and services of the victim organization to convince the recipient to open the malicious attachment. The attachment was an archive with what looked like PDF files containing requirements for the requested products and services – but in fact some of these PDFs were executable EXE and DLL files containing malware. The attackers leveraged DLL highjacking techniques and exploited the legitimate Crash reporting Send Utility which is originally designed to help developers get detailed, real-time crash reports for their applications. To function, the malware also retrieved and downloaded a code that was stored in public profiles on popular legitimate platforms to avoid detection. Kaspersky found this code encrypted inside profiles on GitHub, and links to it (also encrypted) – on other GitHub profiles, Microsoft Learn Challenge, Q&A websites, and even Russian social media platforms. All of these profiles and pages were created specifically for this attack. After the malicious code was executed on victims' machines, Cobalt Strike Beacon was launched, and the victims' systems were compromised. ' While we didn't find any evidence of the attackers using real people's social media profiles, as all the accounts were created specifically for this attack, there's nothing stopping the threat actor from abusing various mechanisms these platforms provide. For instance, malicious content strings could be posted in comments on legitimate users' posts. Threat actors are using increasingly complex methods to conceal long-known tools, and it's important to stay up to date with the latest threat intelligence to be protected from such attacks,' comments Maxim Starodubov, Malware Analyst Team Lead at Kaspersky. The method used to retrieve the download address for the malicious code is similar to what was observed in the EastWind campaign linked to Chinese-speaking actors. Kaspersky recommends that organizations follow these security guidelines to stay safe: Track the status of digital infrastructure and continuously monitor the perimeter. Use proven security solutions to detect and block malware embedded within bulk email. Train staff to increase cybersecurity awareness. Secure corporate devices with a comprehensive system, such as Kaspersky Next, that detects and blocks attacks in the early stages. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at

Netscout empowers customers to defeat cyberthreats with AI-powered DDoS defense
Netscout empowers customers to defeat cyberthreats with AI-powered DDoS defense

Zawya

time13 hours ago

  • Zawya

Netscout empowers customers to defeat cyberthreats with AI-powered DDoS defense

Dubai, UAE – NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of observability, AIOps, cybersecurity, and DDoS attack protection solutions, today announced new AI-backed enhancements to its NETSCOUT Arbor Edge Defense and NETSCOUT Arbor Enterprise Manager Adaptive Distributed Denial of Services (DDoS) solution to help customers further automate operations, enhance defense, and improve reporting. These powerful enhancements leverage AI to intelligently automate defenses against an expanding array of attack vectors, enabling customers to accelerate their response to DDoS attacks to better protect their most critical applications and services. The Arbor Edge Defense and Arbor Enterprise Manager solution utilizes the ATLAS Intelligence Feed, derived from monitoring over 700 Tbps of Internet traffic in real-time across over 500 ISPs and 2,000 enterprise sites from over 100 countries, representing approximately 50% of global Internet activity at any given time. AI/ML algorithms run in the ATLAS cloud infrastructure as part of a unique data collection and analysis pipeline that delivers actionable intelligence to NETSCOUT solutions that are constantly updated. ATLAS Intelligence Feed fuels all Arbor DDoS protection products with intelligence on devices that are actively conducting DDoS attacks or are a part of specific DDoS attack infrastructures and botnets. This allows up to 80% of all DDoS attacks to be mitigated without the need for further analysis. 'IT buyers' security concerns signal a growing demand for integrated application protection and availability technologies to identify and mitigate DDoS threats,' said Chris Rodriguez, research director, security and trust, International Data Corporation (IDC). 'According to IDC buyer research conducted in April 2025, 41% of organizations stated that online attacks, including DDoS incidents, cost over $100,000 in damage, with 5% stating more than $1 million. With the increased use of AI/ML to launch cyber-attacks, organizations need to invest in intelligent solutions to continuously detect new attack types and threats to avoid costly damage to critical IT infrastructure.' The new enhancements to the Arbor Edge Defense and Arbor Enterprise Manager solution include new features to support deployment in demanding multi-site enterprise environments, and further automate the mitigation of sophisticated DDoS attacks: Strengthened data segmentation through scoped user access that allows administrators to limit the visibility of specific operations teams to specific defended locations and infrastructures. Automated IP protocol flooding detection and mitigation to block these evolving attacks when they occur. Enhanced DDoS dashboard that provides more detailed information, enabling even greater visibility and control for operations teams, even when defenses are automated. On-demand, automated reports ease the flow of information across security teams and their management. 'We're continually innovating to stay ahead of the growing array of DDoS cybersecurity threats as part of our Adaptive DDoS Protection strategy,' said Scott Iekel-Johnson, area vice president, DDoS and threat intelligence at NETSCOUT. 'With these enhancements, we're helping customers intelligently automate their defenses—delivering stronger protection against evolving DDoS attacks while simplifying how they manage and analyze threats.' Visit our website to learn more about our award-winning Adaptive DDoS Protection solutions. About NETSCOUT NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) protects the connected world from cyberattacks and performance and availability disruptions through its unique visibility platform and solutions powered by its pioneering deep packet inspection at scale technology. NETSCOUT serves the world's largest enterprises, service providers, and public sector organizations. Learn more at or follow @NETSCOUT on LinkedIn, X, or Facebook. ©2025 NETSCOUT SYSTEMS, INC. All rights reserved. Third-party trademarks mentioned are the property of their respective owners. Editorial Contacts: Active DMC for NETSCOUT netscoutme@

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store