Osano, a company building the first platform for data privacy transparency, has automated the compliance process for the California Consumer Privacy Act (CCPA). A week into activation, the CCPA is already a notoriously contentious and dense set of laws. By…
Category: Help Net Security
Cygilant updates its SecureVue Cloud Platform, enhancing security monitoring and visibility
Cygilant, leading Cybersecurity Agency and provider of Security-as-a-Service to mid-sized organizations, highlighted recent additions to its SecureVue Cloud Platform. SecureVue Cloud enables clients to quickly gain comprehensive visibility into their cloud-based operations, making it easier to identify potential problems and…
Quanta Storage adopts SecureCircle’s DASB to eliminate insider threats
SecureCircle, the world’s first Data Access Security Broker (DASB), announced an agreement to eliminate insider threats such as accidental sharing and malicious users with Quanta Storage (QSI). QSI, a worldwide leader in OEM and ODM services to the world’s leading…
Dynatrace, Google and Microsoft collaborate to help make OpenTelemetry enterprise-grade
Software intelligence company, Dynatrace, announced it is collaborating with Google and Microsoft on the OpenTelemetry project to shape the future of open standards-based observability. To further advance the industry and extend the reach of its Software Intelligence Platform, Dynatrace is…
Evertech replaces its IP Address Management platform with FusionLayer Infinity
FusionLayer announced that Evertech has replaced its traditional IP Address Management (IPAM) platform with FusionLayer Infinity, the software-defined IPAM solution designed to simplify network automation for cloud-native service provider platforms utilizing containers. Evertech selected the FusionLayer solution to replace its…
Wind River acquires Star Lab to broaden portfolio with cyber and anti-tamper security software for Linux
Wind River, a leader in delivering software for the intelligent edge, announced its acquisition of Star Lab, a leader in cybersecurity for embedded systems. The acquisition broadens the comprehensive Wind River software portfolio with a system protection and anti-tamper toolset…
AttackIQ promotes Stacey Meyer to vice president of federal operations
AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced the promotion of Stacey Meyer to vice president of federal operations. “Stacey has proven to be an invaluable member of the AttackIQ team,” said Carl Wright, chief commercial…
James W. Sample joins Xcel Energy as vice president, Chief Security Officer
Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program, overseeing all aspects of security including cybersecurity, physical security and the safety of personnel.…
Software AG appoints Dr. Matthias Heiden as its new Chief Financial Officer
Software AG announced the appointment of Dr. Matthias Heiden as its new Chief Financial Officer (CFO). Dr. Heiden will be taking over from Arnd Zinnhardt, who will step down after 18 years in the role. Dr. Heiden will join Software…
iPipeline names Daphne Thomas as Chief Operating Officer
iPipeline – a leading provider of cloud-based software solutions for the life insurance and financial services industry – announced the appointment of Daphne Thomas to the role of Chief Operating Officer. The appointment comes several months after iPipeline was acquired…
High-risk Google account owners can now use their iPhone as a security key
Google users who opt for the Advanced Protection Program (APP) to secure their accounts are now able to use their iPhone as a security key. About Google’s Advanced Protection Program Google introduced the Advanced Protection Program in late 2017, to…
Kubernetes bug bounty program open to anyone, rewards up to $10,000
The Cloud Native Computing Foundation is inviting bug hunters to search for and report vulnerabilities affecting Kubernetes. Offered bug bounties range between $100 to $10,000. What is Kubernetes? Kubernetes is an open-source container-orchestration system for automating application deployment, scaling, and…
Companies increasingly reporting attacks attributed to foreign governments
More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions soaring In 2018, 19% of organizations believed they were attacked by a nation-state. That figure increased to 27%…
Cyber attackers turn to business disruption as primary attack objective
Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals. Another notable finding…
Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities
Information Technology spending by Department of Defense (DOD) and Intelligence Community (IC) agencies will continue to grow as they work to keep pace with the evolution of both the threat landscape and technology development, according to Deltek. Intelligence community The…
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications
Masergy launched its Masergy Shadow IT Discovery solution. Shadow IT Discovery exposes enterprises to significant cybersecurity risks. Building on its mission to make security intrinsic to its SD-WAN platform and to offer the most robust real-time visibility and control, Masergy…
Cynerio offers hospitals free Windows 7 risk assessment
To prepare for the transition into Windows 7 End of Life, Cynerio is offering hospitals a complementary risk assessment until February 14, 2020. Connected medical devices are the weakest link in healthcare security and the prevalence of devices running on…
GTT expands portfolio with Fortinet’s FortiGate Secure SD-WAN solution
GTT Communications, a leading global cloud networking provider to multinational clients, announced it has expanded its SD-WAN service offering by adding Fortinet Secure SD-WAN as a technology option. GTT delivers Fortinet Secure SD-WAN as a managed service and supports any…
STEALTHbits StealthINTERCEPT 7.0 strengthens enterprise passwords and AD security
STEALTHbits released StealthINTERCEPT 7.0, their real-time Active Directory (AD) policy enforcement solution that audits and blocks unwanted and unauthorized changes, authentications, and queries within the world’s most complex AD infrastructures. With 95 million AD accounts attacked daily and 56% of…
Citrix Analytics for Performance: Identifying performance issues at the individual user level
In the old days, analyzing system performance was all about monitoring speeds and feeds. Today, understanding the user experience (UX) is critical. And to help companies do this, Citrix Systems announced the launch of Citrix Analytics for Performance, a next-generation…
Perfect Sense unveils Gyro to simplify cloud infrastructure management
Perfect Sense, which leverages its Brightspot publishing platform to drive innovations in web and mobile development, launched Gyro – a powerful cloud management tool that mitigates the risks associated with manually provisioning and managing infrastructure, lack of standards in configurations,…
Paysafe and Handpoint enable SaaS-based ISVs to capture card-present payments
Paysafe, a leading specialized payments platform, has expanded its omni-channel payments offering through the launch of the Cloud SDK from Handpoint, a pioneer in defining integrated payments. Complementing the existing Handpoint APIs and SDKs used by Paysafe clients with Android,…
Neustar launches UltraThreat Feeds, a service providing near real-time threat data
Neustar, a global information services company and leader in identity resolution, announced the release of UltraThreat Feeds, a new service that provides its enterprise customers with access to real-time threat data to help them better identify cyber threats as they…
Temenos Infinity: Giving banks the ability to create AI-driven customer experiences
Temenos, the banking software company, announced that it has delivered new industry first Banking Distribution Services as part of the award-winning Temenos Infinity digital front-office banking product. Temenos Infinity is the first core-agnostic product to give banks the ability to…
ManageEngine Applications Manager now supports Oracle Autonomous Database
ManageEngine, the IT management division of Zoho Corporation, announced that Applications Manager, its server, cloud, and application performance monitoring solution, now supports Oracle Autonomous Database. This move enables enterprise IT operations teams and cloud database administrators (DBAs) to gain visibility…
Entisys360 purchases PTP’s cybersecurity technology and support solutions assets
Entisys360, an award-winning IT consultancy specializing in the deployment and delivery of advanced IT infrastructure, virtualization, security, automation and cloud first solutions, announced that is has purchased Performance Technology Partner’s (PTP) cybersecurity technology and support solutions assets. Inclusive of security…
Samsung acquires TeleWorld Solutions to accelerate and simplify rollouts of 5G networks
Samsung announced the completion of an agreement to acquire TeleWorld Solutions (TWS), a network services provider headquartered in Chantilly, VA. TWS provides network design, testing and optimization services to mobile service and cable operators, equipment OEMs and other companies across…
NortonLifeLock announces purchase of ID Analytics by LexisNexis Risk Solutions
NortonLifeLock, a global leader in consumer cyber safety, announced LexisNexis Risk Solutions, part of RELX, has entered into an agreement to acquire ID Analytics (IDA), a trusted provider of credit and fraud risk solutions for enterprises, for a purchase price…
Trusona raises $20M to meet growing demand and accelerate innovations
Trusona, the leader in passwordless multi-factor authentication technology, announced that it has secured $20 million in additional financing led by growth equity firm Georgian Partners. Prior investors including Kleiner Perkins, M12, OurCrowd and Seven Peaks Ventures also participated in the…
January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSA
As forecasted, January 2020 Patch Tuesday releases by Microsoft and Adobe are pretty light: the “star of the show” is CVE-2020-0601, a Windows flaw flagged by the NSA that could allow attackers to successfully spoof code-signing certificates and use them…
Security pitfalls to avoid when programming using an API
OWASP’s API Security Project has released the first edition of its top 10 list of API security risks. The most common and perilous API security risks API abuse is an ongoing problem and is expected to escalate in the coming…
2020 forecast: Attackers will target non-traditional systems
While plenty of attacks will continue to hit traditional targets such operating systems and humans, 2020 will see many attackers taking aim at non-traditional systems. Containers, connected devices and the communications between the two technologies will be a primary focus…
A 101 guide to mobile device management
Extending beyond the traditional company network, mobile connectivity has become an extension of doing business and IT staff need to not just rethink how existing activities, operations, and business models can fit into mobile constructs, but rethink how mobility can…
Fraud prevents a third of businesses from expanding digital capabilities
Kount released a new research report on digital innovation and emerging fraud, which found that the most innovative businesses are also the ones facing the greatest fraud threats. The report, conducted by Javelin Research, surveyed hundreds of respondents across the…
Neustar offers companies a flexible customer identity authentication solution
Neustar, a global information services company and leader in customer identity solutions, has expanded its digital identity risk portfolio to address the needs of companies looking for a more flexible customer identity authentication solution. The company is introducing Digital Identity…
PLDA completes PCIe 4.0 specification compliance testing with its XpressRICH-AXI Controller IP
PLDA, the industry leader in PCI Express (PCIe) IP and data interconnect solutions, announced that their XpressRICH-AXI PCIe Controller IP passed all Gold and Interoperability tests at the PCI-SIG Compliance Workshop. PLDA’s XpressRICH-AXI Controller IP for the PCIe 4.0 specification…
Zyxel redesigns its Nebula Cloud Networking Solution, expands product family
Zyxel Communications, a leading provider of secure broadband networking, Internet access and connected home products, announced the release of a major redesign of the Nebula Cloud Networking Solution. In addition to a new, enhanced user interface, Zyxel has made it…
Benefit Vantage and 3 Hong Kong to deploy IPification mobile authentication solution
Benefit Vantage, developer of IPification seamless authentication solution, and leading mobile operator 3 Hong Kong, are proud to announce the deployment of IPification mobile authentication solution. Leveraging 3 Hong Kong’s full network capabilities, IPification provides quick and easy user registration…
Hiscox to use CyberCube’s cyber analytics technology to better understand systemic cyber risk
Cyber risk analytics company CyberCube, has signed an agreement with global specialist insurer Hiscox, for the use of CyberCube’s ground-breaking technology to generate better insight into potential systemic cyber risk. The deal gives Hiscox access to CyberCube’s Portfolio Manager product,…
Nanhi Singh and Paul J. Loftus appointed to lead Imperva through next phase of growth
Imperva, the cybersecurity leader championing the fight to secure data and applications wherever they reside, announced the appointment of Nanhi Singh as chief customer officer and Paul J. Loftus as chief revenue officer to lead the company through its next…
Accenture names Marco Huwiler country managing director for Switzerland
Accenture has named Marco Huwiler country managing director for Switzerland. In this role, Huwiler leads Accenture’s growing business in Switzerland, which supports over 100 clients, applying new digital technologies to drive innovation and transform their organizations. Huwiler (44) currently heads…
Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking
A vulnerability (CVE-2019-19494) in Broadcom‘s cable modem firmware can open unknown millions of broadband modems by various manufacturers to attackers, a group of Danish researchers has warned. About CVE-2019-19494 CVE-2019-19494, also dubbed Cable Haunt, is present in the spectrum analyzer,…
Exploits for Citrix ADC and Gateway flaw abound, attacks are ongoing
With several exploits targeting CVE-2019-19781 having been released over the weekend and the number of vulnerable endpoints still being over 25,000, attackers are having a field day. Do you use Citrix’s Application Delivery Controller (ADC) or Gateway? If you haven’t…
Number of 5G connections to reach 1.5 billion globally by 2025
The total number of 5G connections will reach 1.5 billion globally by 2025, rising from only 5 million in 2019, according to Juniper Research. This is an annual average growth of 150% over the next 6 years. The new study…
A case for establishing a common weakness enumeration for hardware security
As modern computer systems become more complex and interconnected, we are seeing more vulnerabilities than ever before. As attacks become more pervasive and sophisticated, they are often progressing past the software layer and compromising hardware. As a response, the industry…
Transact with trust: Improving efficiencies and securing data with APIs
Developments in integration and APIs have provided businesses with huge benefits. Together, they provide businesses with newfound opportunity to unlock new revenue sources by making data more accessible rather than being stacked disparately at the edge or in on-premise sites.…
Semtech’s new AVX chipset offers enhanced performance for AV extension applications
Semtech, a leading supplier of high performance analog and mixed signal semiconductors and advanced algorithms, recently launched the AVX chipset for multimedia connectivity over both copper category cabling and optical fiber. The AVX200T flagship part offers unprecedented levels of performance…
CSA SECtember: A new global event dedicated to the intersection of cloud and cybersecurity
The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, announced it is changing the way the cloud and cybersecurity industry meets with the launch…
Hampton Products adds indoor and outdoor security cameras to its suite of smart home products
Hampton Products is introducing a new collection of indoor and outdoor security cameras to its Array By Hampton suite of smart home products. The new smart home security cameras operate through the Array iOS and Android apps and are part…
Zimperium integrates with Microsoft Defender Advanced Threat Protection EDR
Zimperium, the global leader in mobile threat defense (MTD), announced it has integrated with Microsoft Defender Advanced Threat Protection (ATP) endpoint detection and response (EDR). Microsoft Defender ATP customers now have access to: Advanced threat forensics – Microsoft Defender ATP…
Ping An Technology and Intel to establish a joint laboratory, cooperate on products and technology
Ping An Insurance announced that Ping An Technology and Intel signed a strategic collaboration agreement in Shenzhen, China. The two companies plan to establish a joint laboratory, cooperate on products and technology, and form a joint project team in areas…
Netskope opens new data center in Johannesburg, South Africa
Netskope, the leader in cloud security, has announced the opening of a dedicated data centre in Johannesburg, South Africa. The new point of presence (PoP) is part of the company’s ongoing strategy to ensure its real time security solutions for…
Week in review: Citrix bug under attack, Windows 7 ransomware risk, ATT&CK for ICS
Here’s an overview of some of last week’s most interesting news and articles: Travelex extorted by ransomware gang, services still offline a week after the hit On the last day of 2019, foreign exchange company Travelex was hit by cyber…
Office 365 users: Beware of phishing emails pointing to Office Sway
One of phishers’ preferred methods for fooling both targets and email filters is to use legitimate services to host phishing pages. The latest example of this involves Office 365 users being directed to phishing and malicious pages hosted on Office…
Companies: Lean into consumer privacy to win
The California Consumer Privacy Act became effective on the first day of 2020 and will affect millions of consumers and tens of thousands of companies. The advent of the CCPA and other similar regulations marks a sea change in how…
January 2020 Patch Tuesday forecast: Let’s start the new decade right
The holidays are over, and another Patch Tuesday is rapidly approaching. My New Year’s resolution was to stop procrastinating when it comes to getting organized. I have several locations in my house where I store things and every time I…
New infosec products of the week: January 10, 2020
Arlo SmartCloud: A SaaS solution securing cloud services for businesses Arlo SmartCloud is a fully managed global platform built for security, scalability and reliability that can be deployed as part of subscription services for hardware companies, automotive companies, service providers,…
What students think about university data security
Only 32% of students agree they are aware of how their institution handles their personal data, compared to 45% who disagree and 22% who neither agree nor disagree, according to a Higher Education Policy Institute (HEPI) survey of over 1,000…
TDK InvenSense SmartSense: A wireless multi-sensor solution for various IoT apps
TDK announces the availability of the InvenSense SmartSense, a compact, wireless multi-sensor solution designed for a plethora of IoT applications. The new, out-of-the-box sensor solution enables accurate and remote monitoring, data collection and specific IoT sensor application outputs via BLE…
Skyworks’ solutions offer enhanced IoT connectivity for expanding connected home market
Skyworks Solutions, an innovator of high performance analog semiconductors connecting people, places and things, announced that its proprietary solutions are powering essential connectivity in platforms across the growing smart home security segment. Leading brands including Amazon, Arlo, Google, Honeywell and…
PacketViper Deception360 now available for Microsoft Azure
PacketViper, the cyber deception leader for automated threat detection, prevention and response, announced the general availability of Deception360 for Microsoft Azure. Deception360 for Azure cloud helps customers leverage deception to reduce dwell time and respond to threats within the Azure…
Covered Security provides financial incentive to improve security practices
Covered Security announced the Covered Kudo Sweepstakes, providing financial incentive for enterprise and home users of its Personal Assistant for Security to improve their security practices. Making the adoption of improved security habits fast, simple, and personally rewarding, the Personal…
SSH and Digital Information Technologies help enterprises mitigate risks of privileged credential abuse
SSH Communications Security, one of the world’s most trusted security brands, has formed a partnership with Digital Information Technologies (DIT), an independent systems integration company operating in Japan since 1982. Adoption of multi-cloud and hybrid services creates a lot of…
SnapLogic names Dayle Hall as Chief Marketing Officer
SnapLogic, provider of the #1 Intelligent Integration Platform, announced that it has named Dayle Hall as its new Chief Marketing Officer (CMO). Hall, who brings two decades of success building and scaling marketing organizations for high-growth technology companies, will lead…
Kovrr appoints Kurt Jackson as Vice President of Sales of North America
Cyber risk modeling company, Kovrr, welcomes Kurt Jackson. In his role, Kurt will focus on leading and expanding business activity in North America. “Kurt is a great addition to the Kovrr leadership team. He brings more than 20 years of…
Attackers exploiting critical Citrix ADC, Gateway flaw, company yet to release fixes
Nearly a month has passed since Citrix released mitigation measures for CVE-2019-19781, a critical vulnerability affecting Citrix Application Delivery Controller and Citrix Gateway, which could lead to remote code execution. The end of the year festivities and holidays can be…
Fingerprint Cards adds two capacitive touch sensors to its fingerprint authentication portfolio
In order to meet the unique needs of the diverse and growing market for biometric access control, world-leading biometrics company Fingerprint Cards AB announces the expansion of its fingerprint authentication touch sensor portfolio, for physical and logical access devices and…
Mozilla patches actively exploited Firefox zero-day
Mozilla has patched a Firefox zero-day vulnerability (CVE-2019-17026) that is being exploited in attacks in the wild and is urging Firefox and Firefox ESR users to update their installations as soon as possible. About CVE-2019-17026 A day after Mozilla released…
Insight Partners to acquire Veeam for $5 billion
Software investor Insight Partners announced that it has entered into a definitive agreement to acquire Veeam Software, the leader in Backup solutions that deliver Cloud Data Management. Under the ownership of Insight Partners, Veeam will become a U.S. company, with…
Why outsourcing your DPO role is an effective insurance policy
Organizations are starting to take a much more considered approach to data protection as high-profile regulatory action for data mishandlings has raised both the stakes and interest in data privacy operations. Since the EU General Data Protection Regulation (GDPR) came…
California’s IoT cybersecurity bill: What it gets right and wrong
California state lawmakers should be lauded for SB 327, their well-intentioned legislative attempt at tackling one of the most pressing issues in the tech sector: IoT security. But as the law went into effect at the start of the year,…
When do you plan to upgrade to 5G?
The smartphone will remain the dominant consumer device into the new decade, but the arrival of 5G will not guarantee a surge in device upgrades, according to a GSMA Intelligence research. 5G upgrade Based on the results of a survey…
eBook: How Hackers Plan Their Attacks
Being the good guys, we think about how to protect ourselves from cyberattacks. But have you ever tried thinking like hackers planning their next attack? BitDam founders used to serve at the offensive side of the fence. They know how…
Comcast launches xFi Advanced Gateway, a WiFi 6 certified device
Comcast announced that its next-generation xFi Advanced Gateway, its first device capable of delivering true multi-gigabit speeds, will begin rolling out to customers in the coming months. Comcast, the nation’s largest gigabit speed provider, now becomes one of the first…
DeCloak offers third-party solution of de-identification technique
DeCloak is the ultimate solution for keeping personal info de-identified while allowing businesses to gather and analyze valuable user behavior information. DeCloak offers a brand new third-party solution of de-identification technique to create a win-win situation for the consumers, and…
Western Digital unveils SSD prototype featuring a SuperSpeed USB 20Gbps interface
Western Digital will showcase new innovations in its extensive lineup of storage solutions built for every consumer use, including a demonstration of the world’s highest capacity, pocket-sized, portable SSD prototype featuring a SuperSpeed USB 20Gbps interface. The company is also…
ARRIS launches new SURFboard mAX AX6600 Mesh Wi-Fi 6 system
ARRIS announced a new addition to its industry-leading gigabit whole-home mesh portfolio: The SURFboard mAX AX6600 Mesh Wi-Fi 6 system. The all-new system provides a new performance benchmark for the SURFboard gigabit Wi-Fi portfolio and fits seamlessly into any home…
FedRAMP Authorized MobileIron Cloud offering now includes MobileIron Threat Defense
MobileIron announced that its FedRAMP Authorized MobileIron Cloud offering now includes MobileIron Threat Defense (MTD). This means federal agencies can build upon MobileIron Cloud with MTD for mobile threat detection and remediation. FedRAMP is a government-wide program that provides a…
Mobilestack offers managed WiFi and Security Service for Small Business and AirBNB hosts
Mobilestack announces availability of managed WiFi and Security Service to solve cybersecurity and privacy risks for Small Business and AirBNB hosts. At $25 per month with one month free trial, small business and AirBNB hosts can offer Guest-WiFi to grow…
Avnet’s new Partner Program gives developers a place to build and scale IoT solutions
At CES 2020, leading global technology solutions provider Avnet is launching a new Partner Program designed to provide developers with a place to build complete IoT solutions, enabling them to scale their business in a quick and cost-effective manner. Using…
Karamba Security signs agreements for securing 1 million connected devices
Karamba Security, a world-leading provider of embedded cybersecurity for connected devices, announced an industry milestone – signed agreements for securing 1 million connected devices. Karamba’s product suite, on display during this week’s CES 2020, seamlessly protects connected devices against cyber…
Bidpath selects the ZeroNorth platform to strengthen its software security program
ZeroNorth, the industry’s first provider of risk-based vulnerability orchestration for applications and infrastructure, announced that the leading global auction software company, Bidpath, selected the ZeroNorth platform to strengthen its software security program. By orchestrating multiple software scanning tools through the…
BlackBerry leverages ANSYS’ solutions for autonomous systems development
BlackBerry and ANSYS are joining forces to support BlackBerry QNX’s industry-leading real-time operating system (RTOS) for connected and autonomous vehicles. As part of ANSYS’ ongoing commitment to fostering an open ecosystem that supports RTOS leaders across industries, the collaboration will…
Accenture agrees to acquire Symantec’s Cyber Security Services business from Broadcom
Accenture has agreed to acquire Symantec’s Cyber Security Services business from Broadcom. Financial terms were not disclosed. The acquisition will make Accenture Security one of the leading providers of managed security services, further enhancing its ability to help companies rapidly…
Pedro Vidal joins AttackIQ’s executive team as vice president of North America sales
AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced Pedro Vidal has joined the company’s executive team as vice president of North America sales. “Pedro is a proven force in the sales industry for security, making him…
Rockwell Automation to acquire Avnet to deliver IT/OT cybersecurity services globally
Rockwell Automation announced that it has signed an agreement to acquire privately held Avnet Data Security, an Israeli-based cybersecurity provider with over 20 years of experience providing cybersecurity services. Avnet offers a full set of IT/OT cyber services and solutions…
DXC Technology appoints Carla Christofferson as chief risk officer
DXC Technology announced that Carla Christofferson has been appointed chief risk officer to lead the company’s risk and security efforts. Christofferson will report to Mike Salvino, DXC’s president and chief executive officer, as a key advisor on embedded and emerging…
App on Google Play exploited Android bug to deliver spyware
Google has pulled three malicious apps from Google Play, one of which exploits a recently patched kernel privilege escalation bug in Android (CVE-2019-2215) to install the app aimed at spying on users. About CVE-2019-2215 The existence of CVE-2019-2215 was discovered…
Travelex extorted by ransomware gang, services still offline a week after the hit
On the last day of 2019, foreign exchange company Travelex was hit by cyber attackers wielding the Sodinokibi (aka REvil) ransomware. More than a week later, the company’s websites and online services are still offline despite the company’s remediation efforts.…
Cloudflare for Teams: Protecting corporations without sacrificing performance
Cloudflare, the security, performance, and reliability company helping to build a better Internet, announced that it has launched Cloudflare for Teams, a set of solutions that will secure corporations and their employees globally, without sacrificing performance. Cloudflare for Teams is…
ATT&CK for ICS: Knowledge base of techniques used by cyber adversaries
MITRE released an ATT&CK knowledge base of the tactics and techniques that cyber adversaries use when attacking ICS that operate some of the nation’s most critical infrastructures including energy transmission and distribution plants, oil refineries, wastewater treatment facilities, transportation systems,…
Cloudflare for Teams: Protecting corporations and employees, without sacrificing performance
Cloudflare, the security, performance, and reliability company helping to build a better Internet, announced that it has launched Cloudflare for Teams, a set of solutions that will secure corporations and their employees globally, without sacrificing performance. Cloudflare for Teams is…
Why the 2020 US presidential election is still vulnerable to foreign interference
With the international political situation becoming increasingly fraught and divisive, it is hard to ignore the shadow of foreign interference looming over electoral proceedings around the world. Not only are the US elections arguably some of the most influential on…
Smart cities are on the rise, what are the dangers?
A combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds of the global population will be living in cities, up from just…
Trends that will shape the 2020 technology market
In 2020, there will be greater adoption of Continuous Intelligence (CI) technologies, which will elevate IoT data analytics way beyond traditional operational levels and have a greater impact on strategic planning and organizational change, states ABI Research. Looking at the…
Are you ready for the end of Windows 7 support?
Windows 7 support will end on January 14, 2020. From a security perspective, security patches will not be available. Cynet 360 autonomous breach protection is a good example of a multilayered advanced protection solution that can enables organizations who run…
Tapplock introduces new enterprise fingerprint scanning padlock accessories
Padlocks are commonly used in businesses to secure assets, but assigning keys, managing user permissions and tracking access history is time-consuming, inefficient and often times impractical. Tapplock, creator of the world’s first smart fingerprint padlock, is introducing new accessories for…
Wind River provides software support for the latest NXP S32G processors
Wind River, a leader in delivering software for the intelligent edge, announced software support for the latest NXP S32G processors. The new processors combine hardware security; ASIL D safety; high-performance processing; and network acceleration for service-oriented gateways, domain controllers, and…
Inseego launches new second-generation 5G devices
Inseego, a pioneer of 5G products and intelligent IoT device-to-cloud solutions, is extending its industry leadership with a full lineup of new second-generation 5G devices that leverage the new Qualcomm Snapdragon X55 5G modem. Inseego 5G products will also power…
TP-Link HomeCare Pro: A smart home IoT security solution powered by Avira
TP-Link, a leading global provider of consumer and business networking products, unveiled HomeCare Pro powered by Avira, an advanced network security solution that protects every device on your home network. “TP-Link is proud to partner with security leader Avira to…