The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, athletics, etc.) will account for 80 percent of your results. Simply put: work…
Category: Help Net Security
Economic impact and perceptions around the cybersecurity gender gap
If the number of women working in cybersecurity in the United States equalled that of men, the economic footprint of the U.S. cybersecurity industry would increase by $30.4 billion, according to Tessian. Furthermore, an additional $12.7 billion would be added…
Rising threats call for primary cyber resilience, new strategies for governments
Cybercriminals are holding governments hostage more frequently, expanding their attack base, and asking for more money, according to a report released by Deloitte. The study explores the rising trend in ransomware attacks on state and local governments. It also discusses…
ClearDATA Locate Mask facilitates compliant data sharing without diminishing its value
ClearDATA, the leader in healthcare public cloud security, compliance and privacy, announced a new Software as a Service (SaaS) solution, ClearDATA Locate Mask, that enables healthcare organizations to leverage unstructured datasets containing PHI or PII by masking or redacting the…
HPE 5G Core Stack: An open, cloud-native 5G core network solution that speeds up 5G adoption
Hewlett Packard Enterprise (HPE) announced a breakthrough in the journey to true 5G adoption with the launch of HPE 5G Core Stack, an open, cloud-native 5G core network solution that accelerates the journey to new 5G revenue streams, seamlessly integrates…
IDERA expands portfolio of cloud-based database and workload management solutions for SQL Server
IDERA, a provider of powerful database productivity tools, announced an expanded portfolio of cloud-based database and workload management solutions for SQL Server. These solutions empower organizations to manage the performance and availability of cloud and traditional databases in a single…
SailPoint introduces identity governance for IaaS platforms, resources and workloads
SailPoint Technologies Holdings, the leader in identity management, introduced identity governance for IaaS platforms, resources and workloads. As enterprises adopt a multi-cloud platform strategy across AWS, Azure and the Google Cloud Platform to keep pace with digital transformation, there is…
Open Group delivers new platform for the improved use of open source software
The Open Group, the vendor-neutral technology consortium, and the University of L’Aquila announced a partnership with a consortium of leading European research organizations, technology developers, industrial software developers, and open source forge providers. Together, they have addressed the complexity of…
Absolute ensures remote workers have secure access to critical business apps and information
Absolute, the leader in endpoint resilience, announced free access for many of its existing customers to Absolute’s patented Persistence technology in order for these customers to ‘persist,’ or proactively repair and reinstall their existing virtual private network (VPN) applications. By…
Cygilant enhances its SOCVue platform to help teams detect and respond to threats faster
Cygilant, provider of Cybersecurity-as-a-Service to mid-sized organizations, shared recent enhancements to its SOCVue platform that improve the speed, efficiency and accuracy of how the company collaborates and solves problems for customers. The SOCVue security operations and analytics platform enables quick…
Neustar enhances UltraGeoPoint to help customers better target and geolocate IPv6 addresses
Neustar, a global information services and technology company and leader in identity resolution, announced significant enhancements to its market-leading IP address geolocation service, UltraGeoPoint, (formerly known as IP GeoPoint) to help customers meet regulatory compliance requirements, strengthen network security and…
Ethernet Alliance stages multivendor integration involving solutions from 17 member companies
The Ethernet Alliance, a global consortium dedicated to the continued success and advancement of Ethernet technologies, announced a successful validation of multivendor interoperability across 10 Gigabit Ethernet (10GbE), 25GbE, 50GbE, 100GbE, 200GbE and 400GbE technologies and solutions from 17 Ethernet…
Coronavirus as an opportunity to evolve security architecture
Fear of coronavirus infections has resulted in organizations ruling out large meetings. Healthy individuals are in home-quarantine for weeks at a time, even though they are not necessarily thought to carry the virus. This large number of individuals complying with…
Wormable Windows SMBv3 RCE flaw leaked, but not patched
Yesterday, when Microsoft released its regular Patch Tuesday fixes, Cisco Talos and Fortinet inadvertently(?) also published information about CVE-2020-0796, a “wormable” vulnerability in the Microsoft Server Message Block (SMB) protocol that has yet to be fixed. Cisco Talos has since…
Cybercriminals leveraging coronavirus outbreak to execute ransomware attacks
Cybercriminals are likely to leverage the global anxiety around the coronavirus outbreak to execute ransomware attacks against businesses, according to RiskIQ. After extensive analysis of past ransomware attacks during global epidemics and current phishing campaigns leveraging the coronavirus, threat actors…
DNS over HTTPS misuse or abuse: How to stay secure
Firefox and Chrome have recently begun supporting external DNS resolvers in the cloud. The use of these DNS services bypasses controls that enterprise IT organizations put in place to prevent end users from visiting unauthorized Internet destinations. Compounding the issue…
IRS scams during tax season target unsuspecting consumers
Scam robocalls and phishing emails disguised as banks continue to trick consumers to put their personal information at risk, and tax season is no exception. Increase in potential threats During this time of the year consumers need to be aware…
Multi-cloud and edge deployments threatened by security and connectivity problems
Organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments, according to a Volterra survey of more than 400 IT executives. The survey reveals that multi-cloud deployments are being driven primarily by a need to maximize availability…
Arista Networks’ new pluggable form factor simplifies DWDM network deployment
Arista Networks announced an optical line system in an OSFP (Octal Small Form-factor Pluggable) module form factor. The Arista OSFP-LS addresses the needs of Tier2 Cloud and Internet Service Providers for high bandwidth links that are easy to deploy and…
Siren 10.4: Finding the shortest data paths across connected records inside Elasticsearch clusters
Siren, the leading Elasticsearch-based investigative intelligence platform, announced the release of Siren 10.4. The latest version of Siren introduces a major breakthrough in big data graph analysis, the capability of finding the “shortest” paths across connected records that are inside…
Everbridge unveils new CEM capabilities for the IoT for corporate, government and healthcare orgs
Everbridge, the global leader in critical event management (CEM), announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organizations to protect their people, assets, operations, supply chain and brand…
Dentsu Aegis Network deploys the SnapLogic platform to integrate SaaS apps and power DX
SnapLogic, provider of the #1 Intelligent Integration Platform, announced that Dentsu Aegis Network, the global marketing service group, has deployed SnapLogic’s leading cloud integration platform to bring together the dozens of different business applications and IT systems across its multiple…
NetApp acquires Talon Storage to solve remote office and branch office challenges with file shares
NetApp, the leader in cloud data services, announced that it acquired Talon Storage, a leader in next generation software-defined storage solutions enabling global enterprises to centralize and consolidate IT storage infrastructure to the public clouds. The combination of NetApp Cloud…
Malwarebytes hires Adam Hyder as its new Senior Vice President of Engineering
Malwarebytes, a leading advanced endpoint detection and remediation solution provider, announced that it has hired Adam Hyder as its new Senior Vice President of Engineering. In this role Hyder will drive Malwarebytes’ product development, innovation strategy, technical vision, and cloud…
March 2020 Patch Tuesday: Microsoft fixes 115 vulnerabilities, Adobe none
It’s March 2020 Patch Tuesday and Microsoft has dropped fixes for 115 CVE-numbered flaws: 26 are critical, 88 important, and one of moderate severity. The good news is that none of them under active attack. For the time being, Adobe…
Hackers are getting hacked via trojanized hacking tools
Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has revealed. “We have found a widespread hacking campaign that uses the…
Hackers are compromising vulnerable ManageEngine Desktop Central instances
Is your organization using ManageEngine Desktop Central? If the answer is yes, make sure you’ve upgraded to version 10.0.474 or risk falling prey to attackers who are actively exploiting a recently disclosed RCE flaw (CVE-2020-10189) in its software. Active exploitation…
Why a risk-based approach to application security can bolster your defenses
Like it or not, cybercrime is big business these days. A casual glance at the news at any given time will typically reveal several new breaches, usually involving eye-watering amounts of personal or sensitive information stolen. As such, any executive…
What is open threat intelligence and what is driving it?
In this podcast recorded at RSA Conference 2020, Todd Weller, Chief Strategy Officer at Bandura Cyber, discusses the modern threat intelligence landscape and the company’s platform. The Bandura Cyber Threat Intelligence Protection Platform: Aggregates IP and domain threat intelligence from…
PPP Daemon flaw opens Linux distros, networking devices to takeover attacks
A vulnerability (CVE-2020-8597) in the Point-to-Point Protocol Daemon (pppd) software, which comes installed on many Linux-based and Unix-like operating systems and networking devices, can be exploited by unauthenticated attackers to achieve code execution on – and takeover of – a…
Researchers develop data exchange approach with blockchain-based security features
An IT startup has developed a novel blockchain-based approach for secure linking of databases, called ChainifyDB. “Our software resembles keyhole surgery. With a barely noticeable procedure we enhance existing database infrastructures with blockchain-based security features. Our software is seamlessly compatible…
eBook: Automating Incident Response
This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve the efficiency of security operations. With automated incident response and security orchestration, your team can: Respond to…
Zimperium’s new solution helps orgs protect their mobile apps throughout their entire life cycle
ZimperiumZimperium, the global leader in mobile threat defense (MTD), announced a first-of-its-kind complete Mobile Application Protection Suite (MAPS), a comprehensive solution that helps organizations protect their mobile apps throughout their entire life cycle. “Until now, organizations trying to secure their…
Telia Carrier’s new global service expands its SD-WAN solution portfolio
Telia Carrier launched its advanced SD-WAN service, an end-to-end networking solution that provides superior visibility, agility and control beyond the traditional WAN perimeter. Based on Cisco SD-WAN powered by Viptela, it is the only SD-WAN service in the world where…
Echoworx enhances its OneWorld cloud-based security platform with user-centric 2FA
Echoworx, the industry leader in message encryption, unveiled enhancements to its OneWorld cloud-based security platform with the addition of user-centric two-factor authentication (2FA), enabling enterprises of all sizes to adopt best-in-class security protocols while improving user experience. “Enterprises, customers and…
Trustwave Fusion platform now available to enterprises in Germany
Trustwave announced the Trustwave Fusion platform, the company’s cloud-native platform that serves as the cornerstone for its products, managed security services and other cybersecurity offerings, in Germany. The platform delivers powerful threat detection and response capabilities to address a constantly…
Global Cloud Xchange and Sparkle add new spectrum capacity over the FA-1 transatlantic system
Global Cloud Xchange, the leading provider of global managed next-generation networks, and Sparkle, the first international service provider in Italy and among the top ten global operators, announced the extension of their partnership by adding new spectrum capacity over the…
Deutsche Telekom and NetMotion enhance security and user experience for mobile workers
Deutsche Telekom and NetMotion have entered into a strategic partnership that will bring the software company’s enterprise-grade solutions to the carrier’s business customers in Germany and beyond. The launch of “Mobile Optimization Pro,” powered by NetMotion, further expands Deutsche Telekom’s…
WatchGuard acquires Panda Security to expand endpoint capabilities
WatchGuard Technologies, a leading global provider of network security and intelligence, secure Wi-Fi and multi-factor authentication, announced that it has entered into a definitive agreement to acquire Panda Security, a leading global provider in advanced endpoint protection. Once the integration…
HPE Container Platform: Unified container platform built on open source Kubernetes
The HPE Container Platform is the industry’s first enterprise-grade container platform designed to support both cloud-native and non-cloud-native applications using 100 percent open source Kubernetes – running on bare-metal or virtual machines (VMs), in the data center, on any public…
Coronavirus-themed scams and attacks intensify
Scammers and other criminals are always quick to take advantage of crises, and this latest – centered around the spread of the deadly Covid-19 coronavirus around the world – is no exception. With the Western world conducting a considerable chunk…
Maximizing customer engagement when fraud prevention is top of mind
With the number of data records breached in 2019 surpassing four billion, fraud prevention and regulatory compliance are, inevitably, top priorities for financial institutions (FIs). A recent report from Javelin, for example, found that FIs are significantly more focused on…
Europe’s Gaia-X cloud service faces a difficult future
In January, Microsoft reported its fiscal 2020 second quarter results. Among the company’s many impressive accomplishments is a 62% growth (yeay-over-year) of its Azure cloud service. This secures the company’s spot as a dominant player in the cloud space for…
Automate manual security, risk, and compliance processes in software development
The future of business relies on being digital – but all software deployed needs to be secure and protect privacy. Yet, responsible cybersecurity gets in the way of what any company really wants to do: innovate fast, stay ahead of…
SymTCP: New approach to protecting Army systems without massive amounts of manual intervention
An approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies, has been identified by the Army’s corporate laboratory researchers in collaboration with the University of California, Riverside. Networked devices and…
Passwords still dominant authentication method, top cause of data breaches
Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user. EMA…
Service providers can secure and protect DNS traffic with A10 Networks DoH capability
A10 Networks announced the availability of its Domain Name System (DNS) over HTTPS (DoH) capability in the Thunder Convergent Firewall (CFW). This native capability enables service providers to offer DoH services to their subscribers. It helps organizations who run DNS…
Aruba’s indoor Wi-Fi 6 APs achieve Wi-Fi CERTIFIED 6 certification from the Wi-Fi Alliance
Aruba, a Hewlett Packard Enterprise company, announced that its full family of high performance indoor Wi-Fi 6 access points (APs) – including the Aruba 500 Series, 510 Series, 530 Series and 550 Series APs – have achieved Wi-Fi CERTIFIED 6…
Accenture acquires Context Information Security to strenghten its existing portfolio
Accenture has acquired Context Information Security, a leading cyber defense consultancy, previously owned by parent company Babcock International Group. Financial terms were not disclosed. Founded in 1998 and headquartered in London, Context is one of the most recognizable and respected…
Week in review: Kali Linux evolution, ransomware getting more fearsome
Here’s an overview of some of last week’s most interesting news, articles and podcasts: March 2020 Patch Tuesday forecast: Let’s put the madness behind us Did you survive the madness of February 2020 Patch Tuesday and its aftermath? We saw…
Unsecured databases continue leaking millions of records
UK ISP and telecom provider Virgin Media has confirmed on Thursday that one of its unsecured marketing databases had been accessed by on at least one occasion without permission (though the extent of the access is still unknown). The database,…
Microsoft releases PowerShell 7 for Windows, macOS and Linux
Microsoft has released PowerShell 7, the latest major update to its popular task automation tool and configuration management framework that can be used on various operating systems. What is PowerShell? PowerShell was initially a Windows component, but was open-sourced in…
March 2020 Patch Tuesday forecast: Let’s put the madness behind us
Did you survive the madness of February 2020 Patch Tuesday and its aftermath? We saw Windows 7 and Server 2008 finally move into extended security support and then Microsoft pulled a rare, standalone Windows 10 security patch following some unexpected…
Your cybersecurity strategy could use some ESP
Embedding cybersecurity into our enterprises remains a difficult problem to solve. Year after year, billions of dollars are spent on building checks and controls, but the rate of attacks and breaches has only accelerated. No one seems to be immune.…
Hackers using hidden mobile apps and unique distribution methods to target consumers
Hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target consumers, according to McAfee. Worldwide detections of LeifAccess, 2019 Last year, hackers targeted consumers with a wide variety of methods, from backdoors to mining cryptocurrencies. Hackers…
Corporate cybersecurity concerns and spend continue to rise, but so do breaches
More than 50 percent of security and IT leaders agree that they are very concerned about the security of corporate endpoints given the prevalence of sophisticated attack vectors like ransomware, disruptionware, phishing and more, according to a survey from RSA…
54% of healthcare vendors have experienced a data breach of protected health information
More than half of all healthcare vendors have experienced a data breach that exposed protected health information (PHI), and it’s a costly problem that points to broken third-party risk assessment processes, according to data released by the Ponemon Institute and…
HITRUST Shared Responsibility: Assigning privacy and responsibility on the cloud
HITRUST, a leading data protection, standards development, and certification organization, announces the general availability of the HITRUST Shared Responsibility Program and Matrix Version 1.0. The Matrix is the first ever common model for communicating and assigning security and privacy responsibility…
Western Digital WD Gold NVMe SSDs: Improving app responsiveness and performance
Western Digital is enabling small and medium-sized enterprises (SMEs) to easily transition to NVMe storage and dramatically improve application performance with a new addition to its portfolio of data center NVMe SSDs: the first enterprise-class NVMe SSD in the WD…
Titus Illuminate 2020 automates protection of unstructured data stored on-premises or in the cloud
Titus, the expert in data classification and a Blackstone portfolio company, introduced Titus Illuminate 2020, the latest release of the company’s flagship solution for identifying and classifying unstructured data at rest. Titus Illuminate 2020 seamlessly integrates with Titus Accelerator for…
Neustar’s enhanced UltraDNS capabilities boast greater capacity, global reach and security
Neustar, a global information services and technology company and leader in identity resolution, has announced it has completed the major upgrade and enhancement of its UltraDNS capabilities, ensuring it remains one of the fastest and most robust always-available DNS providers…
Ron Kormanek joins Checkmarx’s executive management team
Checkmarx, a global leader in software security solutions for DevOps, announced that Ron Kormanek, vice president of North America sales, has been appointed to the company’s executive management team as it continues to drive rapid customer adoption and set the…
Fake alerts about outdated security certificates lead to malware
Cyber criminals have been trying out a new approach for delivering malware: fake alerts about outdated security certificates, complete with an “Install (Recommended)” button pointing to the malware. The malware peddlers behind this scheme are obviously counting on users not…
Vulnerability allows attackers to register malicious lookalikes of legitimate web domains
Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services allowing the use of specific characters that look very much like Latin letters, according to Matt Hamilton,…
Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization
79% of enterprises want better integrated security and governance for their data in the cloud, a survey from AtScale reveals. “As more enterprises embrace cloud transformation, IT and data teams face increased pressure to harness the power of data and…
Devices on 5G networks demand differentiated security solutions
There will be 8.3 billion mobile broadband subscriptions by the end of 2024, which translates to 95 percent of all subscriptions by then, according to the SMU Office of Research & Tech Transfer. Total mobile data traffic will reach 131…
Email domains without DMARC enforcement spoofed nearly 4X as often
As of January 2020, nearly 1 million (933,973) domains have published DMARC records — an increase of 70% compared to last year, and more than 180% growth in the last two years. In addition, 80% of all inboxes worldwide do…
Guide: 10 critical issues to cover in your vendor security questionnaires
In today’s perilous cyber world, companies must carefully check their vendors’ cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire. But these can be a headache, because many questionnaires include hundreds of…
Keysight’s UHD100T32 test system enables 100GE scalability, performance and interoperability validation
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced the release of the UHD100T32 100 Gigabit Ethernet (GE) test system, the industry’s first test system purpose-built to…
BetterUp’s new hyper-personalized products make employee growth and development more effective
BetterUp, the market leader and pioneer of mobile, personalized coaching for professionals, announced two new product innovations – Identify AI and Coaching Clouds – to help organizations deliver more effective, hyper-personalized coaching at scale to any employee at any level…
Radisys delivers its Engage AI-based media apps on OpenNESS to accelerate 4G and 5G networks innovation
Radisys, a global leader of open telecom solutions, announced the deployment of the Radisys Engage portfolio of digital engagement and AI-based real-time media applications on Open Network Edge Services Software (OpenNESS), an open source multi-access edge compute (MEC) platform initiative…
ISACA unveils new audit program for effective incident management
Security incidents are only growing in number—according to ISACA’s 2019 State of Cybersecurity survey report, part 2, 46 percent of respondents believe that their enterprises are experiencing an increase in attacks relative to last year. In light of this, incident…
SentryOne launches new editions of SQL Sentry to help companies right-size monitoring solutions
SentryOne announces new editions of SQL Sentry, the company’s top-rated database performance monitoring product, to help companies select the monitoring solution that best fits their needs. The new editions include support for monitoring SQL Server and related systems running on…
Infoblox NIOS 8.5: Providing a bridge to BloxOne cloud-based network services
Infoblox, the leader in Secure Cloud-Managed Network Services, announced new updates to its Network Identity Operating System (NIOS) platform, adding the ability to monitor NIOS via the cloud-based BloxOne platform, as well as improving performance and simplifying network monitoring for…
Swimlane’s SOAR solution is patented for its many security posture combinations and use cases
Swimlane, a leader in security orchestration, automation and response (SOAR), announced it has been granted US Patent 10,552,615, “Threat Response Systems and Methods,” by the United States Patent and Trademark Office (USPTO). The patent validates Swimlane’s dynamic approach to using…
Appsian enables SAP customers to fill critical GRC gaps that exist in ERP apps
Appsian, the leader in ERP data security, announced the SAP integration certification of their data security and compliance platform for SAP ERP Central Component (SAP ECC) and SAP S/4HANA. By integrating attribute-based access controls (ABAC), fine-grained data security solutions and…
Joel Brunson joins Jazz Networks as CEO of Federal business
Jazz Networks, an award-winning insider threat security company, announced Joel Brunson has joined as CEO of Federal business. Brunson brings world-class leadership in business growth and proven expertise in the federal government sector. “In receiving the highest accolade in the…
Let’s Encrypt will revoke 3m+ TLS/SSL certificates
Starting with 20:00 UTC (3:00pm US EST), today (March 4), the non-profit certificate authority Let’s Encrypt will begin it’s effort to revoke a little over 3 million TLS/SSL certificates that it issued while a bug affected its CA software. Preliminary…
Ransomware getting more fearsome, but there’s reason for optimism
Cybercriminals continued a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability. A report from F-Secure documents a steep increase in attack traffic in 2019 that was…
How adaptive trust makes security efficient
Zero trust is a comprehensive security framework that requires everyone—and every service account—to authenticate identity before entering the corporate network. Every app and every device, as well as all the data they contain, must also be verified for each session.…
A massive increase in eCrime behavior can easily disrupt business operations
During 2019, financially motivated cybercrime activity occurred on a nearly continuous basis, according to a CrowdStrike report. There was an increase in incidents of ransomware, maturation of the tactics used, and increasing ransom demands from eCrime actors. Increasingly these actors…
Online payment fraud attempts see 73% increase
Online payment fraud attempts increased by 73 percent in 2019, according to a report from Sift. Additional findings in the report reveal that cybercriminals are using mobile devices more than desktops or laptops to commit payment fraud. In fact, though…
Social engineering: Mind the identity verification gap
Billions of personal data records are up for sale on the Dark Web as data breaches continue to occur at an alarming rate. According to Risk Based Security’s 2019 Midyear Data Breach report, there was a 54% increase in data…
HID Global launches HID Signo, its signature line of access control readers
HID Global, a worldwide leader in trusted identity solutions, announced the launch of HID Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers…
Keysight’s new Signal Analyzer offers wider bandwidth to meet wireless app test requirements
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, launched the Keysight N9021B MXA X-Series Signal Analyzer which provides design validation and manufacturing engineers with superior phase noise…
Keysight’s new tools speed performance validation of 5G devices prior to market introduction
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, introduced new benchmarking and troubleshooting tools that enable device makers and mobile operators to automate testing and reporting across…
Kingston Digital launches DC1000M, a new U.2 data center NVMe PCIe SSD
Kingston Digital, the Flash memory affiliate of Kingston Technology Company, a world leader in memory products and technology solutions, announced the availability of DC1000M, a new U.2 data center NVMe PCIe SSD. DC1000M is designed to support a wide range…
SnapLogic and Rojo Consultancy simplify SAP and third party systems connections
SnapLogic, provider of the #1 Intelligent Integration Platform, and system integration and data analytics services firm Rojo Consultancy, announced an expanded partnership and new pre-built intelligent connectors to make it faster and easier to integrate SAP applications and data sources…
Trend Micro cooperates with Japan International Cooperation Agency to secure the connected world
Trend Micro, a global leader in cybersecurity solutions, announced new initiatives designed to enhance collaboration with global law enforcement and developing nations through cybersecurity outreach, support and training. “As the eyes of the world turn to Japan for major international…
John F. Abbot joins Datto as Chief Financial Officer
Datto, the leading global provider of cloud-based software and technology solutions delivered through managed service providers (MSPs), announced that John F. Abbot has joined its executive management team as Chief Financial Officer (CFO), effective March 2, 2020. He is based…
How to gather cyber threat intelligence from dark markets without breaking US law
The U.S. Department of Justice’s Cybersecurity Unit has released guidelines for organizations that want to gather cyber threat intelligence from dark web forums/markets but, at the same time, want to stay on the right side of the (U.S. federal criminal)…
Soon, your password will expire permanently
Passwords have been around since ancient times and they now serve as the primary method for authenticating a user during the login process. Individuals are expected to use unique username and password combinations to access dozens of protected resources every…
Security operations and the evolving landscape of threat intelligence
In this podcast recorded at RSA Conference 2020, we’re joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of threat intelligence and the issues surrounding it. Our guests are: Chris Jacob, VP of Threat…
Do you have a data breach response plan?
While corporations today are more knowledgeable about security threats and prepared to respond to data breaches, there are key areas in which progress declined in 2019, according to a study conducted by the Ponemon Institute. Prepare beyond your data breach…
Researchers use ultrasound waves vibrating through tables to access cellphones
Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge. Ning Zhang,…
Download guide: Advanced Threat Protection Beyond the AV
At a certain point, almost every organization reaches the conclusion that there is a need to move past the standard AV and firewall stack in order to protect their environment. The Advanced Threat Protection Beyond the AV guide guides security…
BestCrypt by Jetico expands cross-platform protection to computers with T2 chip
Jetico, long-trusted pioneer in data encryption, announced support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption – Enterprise Edition becomes the industry’s most comprehensive enterprise encryption software for Windows and macOS. “Native OS encryption…
Securonix’s platform products approved for Department of Homeland Security’s CDM program
Securonix, a leader in Next-Gen SIEM, announced that multiple Securonix Security Operations & Analytics Platform products have been approved for Network Security Management of the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program’s Approved Products List. The CDM…
Week in review: Attackers probing for vulnerable Exchange servers, RSA Conference 2020 coverage
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2020 coverage Check out our microsite for related news, photos, product releases, and more. Healthcare industry at greatest risk of data breach The healthcare industry…
Dathena appoints Lylian Kieffer as CTO
Data-security and privacy pioneer Dathena announced the appointment of veteran software engineer Lylian Kieffer as its new Chief Technology Officer. Kieffer will lead Dathena’s engineering department, overseeing development and technical operations as the deep-tech leader expands its global offerings and…