Titus, the expert in data classification and a Blackstone portfolio company, introduced Titus Illuminate 2020, the latest release of the company’s flagship solution for identifying and classifying unstructured data at rest. Titus Illuminate 2020 seamlessly integrates with Titus Accelerator for…
Tag: Help Net Security
Neustar’s enhanced UltraDNS capabilities boast greater capacity, global reach and security
Neustar, a global information services and technology company and leader in identity resolution, has announced it has completed the major upgrade and enhancement of its UltraDNS capabilities, ensuring it remains one of the fastest and most robust always-available DNS providers…
Ron Kormanek joins Checkmarx’s executive management team
Checkmarx, a global leader in software security solutions for DevOps, announced that Ron Kormanek, vice president of North America sales, has been appointed to the company’s executive management team as it continues to drive rapid customer adoption and set the…
Fake alerts about outdated security certificates lead to malware
Cyber criminals have been trying out a new approach for delivering malware: fake alerts about outdated security certificates, complete with an “Install (Recommended)” button pointing to the malware. The malware peddlers behind this scheme are obviously counting on users not…
Vulnerability allows attackers to register malicious lookalikes of legitimate web domains
Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services allowing the use of specific characters that look very much like Latin letters, according to Matt Hamilton,…
Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization
79% of enterprises want better integrated security and governance for their data in the cloud, a survey from AtScale reveals. “As more enterprises embrace cloud transformation, IT and data teams face increased pressure to harness the power of data and…
Devices on 5G networks demand differentiated security solutions
There will be 8.3 billion mobile broadband subscriptions by the end of 2024, which translates to 95 percent of all subscriptions by then, according to the SMU Office of Research & Tech Transfer. Total mobile data traffic will reach 131…
Email domains without DMARC enforcement spoofed nearly 4X as often
As of January 2020, nearly 1 million (933,973) domains have published DMARC records — an increase of 70% compared to last year, and more than 180% growth in the last two years. In addition, 80% of all inboxes worldwide do…
Guide: 10 critical issues to cover in your vendor security questionnaires
In today’s perilous cyber world, companies must carefully check their vendors’ cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire. But these can be a headache, because many questionnaires include hundreds of…
Keysight’s UHD100T32 test system enables 100GE scalability, performance and interoperability validation
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced the release of the UHD100T32 100 Gigabit Ethernet (GE) test system, the industry’s first test system purpose-built to…
BetterUp’s new hyper-personalized products make employee growth and development more effective
BetterUp, the market leader and pioneer of mobile, personalized coaching for professionals, announced two new product innovations – Identify AI and Coaching Clouds – to help organizations deliver more effective, hyper-personalized coaching at scale to any employee at any level…
Radisys delivers its Engage AI-based media apps on OpenNESS to accelerate 4G and 5G networks innovation
Radisys, a global leader of open telecom solutions, announced the deployment of the Radisys Engage portfolio of digital engagement and AI-based real-time media applications on Open Network Edge Services Software (OpenNESS), an open source multi-access edge compute (MEC) platform initiative…
ISACA unveils new audit program for effective incident management
Security incidents are only growing in number—according to ISACA’s 2019 State of Cybersecurity survey report, part 2, 46 percent of respondents believe that their enterprises are experiencing an increase in attacks relative to last year. In light of this, incident…
SentryOne launches new editions of SQL Sentry to help companies right-size monitoring solutions
SentryOne announces new editions of SQL Sentry, the company’s top-rated database performance monitoring product, to help companies select the monitoring solution that best fits their needs. The new editions include support for monitoring SQL Server and related systems running on…
Infoblox NIOS 8.5: Providing a bridge to BloxOne cloud-based network services
Infoblox, the leader in Secure Cloud-Managed Network Services, announced new updates to its Network Identity Operating System (NIOS) platform, adding the ability to monitor NIOS via the cloud-based BloxOne platform, as well as improving performance and simplifying network monitoring for…
Swimlane’s SOAR solution is patented for its many security posture combinations and use cases
Swimlane, a leader in security orchestration, automation and response (SOAR), announced it has been granted US Patent 10,552,615, “Threat Response Systems and Methods,” by the United States Patent and Trademark Office (USPTO). The patent validates Swimlane’s dynamic approach to using…
Appsian enables SAP customers to fill critical GRC gaps that exist in ERP apps
Appsian, the leader in ERP data security, announced the SAP integration certification of their data security and compliance platform for SAP ERP Central Component (SAP ECC) and SAP S/4HANA. By integrating attribute-based access controls (ABAC), fine-grained data security solutions and…
Joel Brunson joins Jazz Networks as CEO of Federal business
Jazz Networks, an award-winning insider threat security company, announced Joel Brunson has joined as CEO of Federal business. Brunson brings world-class leadership in business growth and proven expertise in the federal government sector. “In receiving the highest accolade in the…
Let’s Encrypt will revoke 3m+ TLS/SSL certificates
Starting with 20:00 UTC (3:00pm US EST), today (March 4), the non-profit certificate authority Let’s Encrypt will begin it’s effort to revoke a little over 3 million TLS/SSL certificates that it issued while a bug affected its CA software. Preliminary…
Ransomware getting more fearsome, but there’s reason for optimism
Cybercriminals continued a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability. A report from F-Secure documents a steep increase in attack traffic in 2019 that was…
How adaptive trust makes security efficient
Zero trust is a comprehensive security framework that requires everyone—and every service account—to authenticate identity before entering the corporate network. Every app and every device, as well as all the data they contain, must also be verified for each session.…
A massive increase in eCrime behavior can easily disrupt business operations
During 2019, financially motivated cybercrime activity occurred on a nearly continuous basis, according to a CrowdStrike report. There was an increase in incidents of ransomware, maturation of the tactics used, and increasing ransom demands from eCrime actors. Increasingly these actors…
Online payment fraud attempts see 73% increase
Online payment fraud attempts increased by 73 percent in 2019, according to a report from Sift. Additional findings in the report reveal that cybercriminals are using mobile devices more than desktops or laptops to commit payment fraud. In fact, though…
Social engineering: Mind the identity verification gap
Billions of personal data records are up for sale on the Dark Web as data breaches continue to occur at an alarming rate. According to Risk Based Security’s 2019 Midyear Data Breach report, there was a 54% increase in data…
HID Global launches HID Signo, its signature line of access control readers
HID Global, a worldwide leader in trusted identity solutions, announced the launch of HID Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers…
Keysight’s new Signal Analyzer offers wider bandwidth to meet wireless app test requirements
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, launched the Keysight N9021B MXA X-Series Signal Analyzer which provides design validation and manufacturing engineers with superior phase noise…
Keysight’s new tools speed performance validation of 5G devices prior to market introduction
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, introduced new benchmarking and troubleshooting tools that enable device makers and mobile operators to automate testing and reporting across…
Kingston Digital launches DC1000M, a new U.2 data center NVMe PCIe SSD
Kingston Digital, the Flash memory affiliate of Kingston Technology Company, a world leader in memory products and technology solutions, announced the availability of DC1000M, a new U.2 data center NVMe PCIe SSD. DC1000M is designed to support a wide range…
SnapLogic and Rojo Consultancy simplify SAP and third party systems connections
SnapLogic, provider of the #1 Intelligent Integration Platform, and system integration and data analytics services firm Rojo Consultancy, announced an expanded partnership and new pre-built intelligent connectors to make it faster and easier to integrate SAP applications and data sources…
Trend Micro cooperates with Japan International Cooperation Agency to secure the connected world
Trend Micro, a global leader in cybersecurity solutions, announced new initiatives designed to enhance collaboration with global law enforcement and developing nations through cybersecurity outreach, support and training. “As the eyes of the world turn to Japan for major international…
John F. Abbot joins Datto as Chief Financial Officer
Datto, the leading global provider of cloud-based software and technology solutions delivered through managed service providers (MSPs), announced that John F. Abbot has joined its executive management team as Chief Financial Officer (CFO), effective March 2, 2020. He is based…
How to gather cyber threat intelligence from dark markets without breaking US law
The U.S. Department of Justice’s Cybersecurity Unit has released guidelines for organizations that want to gather cyber threat intelligence from dark web forums/markets but, at the same time, want to stay on the right side of the (U.S. federal criminal)…
Soon, your password will expire permanently
Passwords have been around since ancient times and they now serve as the primary method for authenticating a user during the login process. Individuals are expected to use unique username and password combinations to access dozens of protected resources every…
Security operations and the evolving landscape of threat intelligence
In this podcast recorded at RSA Conference 2020, we’re joined by the ThreatQuotient team talking about a threat-centric approach to security operations, the evolution of threat intelligence and the issues surrounding it. Our guests are: Chris Jacob, VP of Threat…
Do you have a data breach response plan?
While corporations today are more knowledgeable about security threats and prepared to respond to data breaches, there are key areas in which progress declined in 2019, according to a study conducted by the Ponemon Institute. Prepare beyond your data breach…
Researchers use ultrasound waves vibrating through tables to access cellphones
Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge. Ning Zhang,…
Download guide: Advanced Threat Protection Beyond the AV
At a certain point, almost every organization reaches the conclusion that there is a need to move past the standard AV and firewall stack in order to protect their environment. The Advanced Threat Protection Beyond the AV guide guides security…
BestCrypt by Jetico expands cross-platform protection to computers with T2 chip
Jetico, long-trusted pioneer in data encryption, announced support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption – Enterprise Edition becomes the industry’s most comprehensive enterprise encryption software for Windows and macOS. “Native OS encryption…
Securonix’s platform products approved for Department of Homeland Security’s CDM program
Securonix, a leader in Next-Gen SIEM, announced that multiple Securonix Security Operations & Analytics Platform products have been approved for Network Security Management of the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program’s Approved Products List. The CDM…
Week in review: Attackers probing for vulnerable Exchange servers, RSA Conference 2020 coverage
Here’s an overview of some of last week’s most interesting news and articles: RSA Conference 2020 coverage Check out our microsite for related news, photos, product releases, and more. Healthcare industry at greatest risk of data breach The healthcare industry…
Dathena appoints Lylian Kieffer as CTO
Data-security and privacy pioneer Dathena announced the appointment of veteran software engineer Lylian Kieffer as its new Chief Technology Officer. Kieffer will lead Dathena’s engineering department, overseeing development and technical operations as the deep-tech leader expands its global offerings and…
Pivot3 achieves Common Criteria certification for its HCI software platform
Pivot3, a leading provider of intelligent infrastructure solutions, announced that it achieved Common Criteria Assurance Continuity certification for its Acuity 10.6 hyperconverged infrastructure (HCI) software platform. Pivot3 is the only HCI vendor with Common Criteria certification of a native-NVMe solution…
RSA Conference 2020: 36,000 attendees, 704 speakers and 658 exhibitors
RSA Conference concluded its 29th annual event in San Francisco last Friday. More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center last week to explore the Human Element in cybersecurity through hundreds of keynote presentations,…
5 considerations for building a zero trust IT environment
Zero trust isn’t a product or service, and it’s certainly not just a buzzword. Rather, it’s a particular approach to cybersecurity. It means exactly what it says – not “verify, then trust” but “never trust and always verify.” Essentially, zero…
Orgs that sacrifice mobile security are twice as likely to suffer a compromise
The percentage of companies admitting to suffering a mobile-related compromise has grown (39%, when compared to last years’ 33%) despite a higher percentage of organizations deciding not to sacrifice the security of mobile and IoT devices to meet business targets,…
Blue Cedar and Microsoft enable Intune users to connect from managed mobile apps to data sources
Blue Cedar, the company automating the complex workflows between mobile app development and deployment to end users, announced that it is joining the Microsoft Intelligent Security Association. The Association is a group of technology providers who have integrated their security…
Kali Linux evolution: What’s next for the open source pentesting Linux distro?
When the popular security-focused BackTrack Linux distribution was redesigned from the ground up and given the name Kali Linux nearly seven years ago, I remember thinking that it was a fantastic name – and fitting, too. I had the vivid…
Exploring the impact that hybrid cloud is having on enterprise security and IT teams
While enterprises rapidly transition to the public cloud, complexity is increasing, but visibility and team sizes are decreasing while security budgets remain flat to pose a significant obstacle to preventing data breaches, according to FireMon’s 2020 State of Hybrid Cloud…
You are focusing too much on vulnerabilities that pose little danger
Only half of the vulnerabilities in cloud containers ever posed a threat, according to a Rezilion study. The top 20 most popular container images on DockerHub were analyzed to discover that 50% of vulnerabilities were never loaded into memory and…
SECURITI.ai named Most Innovative Startup at RSA Conference 2020
SECURITI.ai was selected winner of the fifteenth-annual RSA Conference Innovation Sandbox Contest and named “Most Innovative Startup” by a panel of leading venture capitalists, entrepreneurs and industry veterans. SECURITI.ai is a leader in AI-powered PrivacyOps. Its PRIVACI.ai solution automates privacy…
Alsid’s new release further hardens AD security
Cybersecurity software provider Alsid releases Alsid for Active Directory version 2.6, the latest iteration of its industry-leading Active Directory (AD) security solution. Alsid for AD is a cloud-based, agentless solution that monitors the security of any Active Directory infrastructure component…
Photos: RSA Conference 2020, part 5
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors include: MobileIron, CodeScan, BlockChain Security,…
Hacking has become a viable career, according to HackerOne
HackerOne announced findings from the 2020 Hacker Report, which reveals that the concept of hacking as a viable career has become a reality, with 18% describing themselves as full-time hackers, searching for vulnerabilities and making the internet safer for everyone.…
What is plaguing public sector cyber readiness?
IT complexity, insider threats, and an abundance of privileged users plague public sector cyber readiness, a SolarWinds report has revealed, based on the answers from 400 IT operations and security decisionmakers, including 200 federal, 100 state and local, and 100…
Photos: RSA Conference 2020, part 4
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors and organization include: Shujinko, Build38,…
Tiny cryptographic ID chip can help combat hardware counterfeiting
To combat supply chain counterfeiting, which can cost companies billions of dollars annually, MIT researchers have invented a cryptographic ID tag that’s small enough to fit on virtually any product and verify its authenticity. A 2018 report from the Organization…
Only 38% of US govt workers received ransomware prevention training
73% of government employees are concerned about impending ransomware threats to cities across the country, and more employees fear of cyberattacks to their community than natural disasters and terrorist attacks, an IBM survey has revealed. More than 100 cities across…
More than 40% of privacy compliance technology will rely on AI by 2023
Over 40% of privacy compliance technology will rely on artificial intelligence (AI) by 2023, up from 5% today, according to Gartner. The research was conducted online among 698 respondents in Brazil, Germany, India, the U.S. and the U.K. “Privacy laws,…
Acronis cyber protection solutions help orgs face any modern threat to their data
Acronis, a global leader in cyber protection announced at RSA Conference 2020 several advances in the company’s modern cyber protection approach. Now that new cyberthreats, IT requirements, and protection challenges have rendered traditional backup obsolete, a new approach to data…
SentinelOne launches container and cloud-native workload protection offering
SentinelOne, the autonomous cybersecurity platform company, announced the general availability of its next generation container and cloud-native workload protection (CWPP) offering. The solution is the first to offer fully featured autonomous Runtime Protection, Detection, and Response for cloud workloads. Purpose…
Gurucul unveils cloud-native Unified Security and Risk Analytics platform
Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced Gurucul Unified Security and Risk Analytics, the first cloud-native data science driven platform that unifies key Cyber Defense Center functions to enable contextual, risk-prioritized…
Palo Alto Networks unveils Cortex XSOAR, a security orchestration, automation and response platform
Palo Alto Networks, the global cybersecurity leader, introduced Cortex XSOAR, an extended security orchestration, automation and response platform that empowers security leaders with instant capabilities against threats across their entire enterprise. Cortex XSOAR is an evolution of the Demisto platform,…
SCYTHE Marketplace: Enabling corporate red teams to test the latest real world cyber threats
SCYTHE, a leader in continuous adversarial emulation, is introducing the SCYTHE Marketplace at the RSA Conference 2020. The SCYTHE Marketplace opens up SCYTHE’s synthetic malware creation platform to trusted third party developers so that they can turn their experience and…
(ISC)2 and NTT-AT partner to bring cybersecurity training to Japan
(ISC)2 – the world’s largest nonprofit association of certified cybersecurity professionals – announced an expansion of its strategic partnership with NTT Advanced Technology Corporation (NTT-AT), which will bring more local-language cybersecurity training to Japan. Now recognized as an Official Training…
CrowdStrike Falcon’s expanded visibility protects workloads across all environments
CrowdStrike, a leader in cloud-delivered endpoint protection, announced at RSA Conference 2020 it is expanding the industry-leading visibility of the CrowdStrike Falcon platform, to protect workloads, across all environments, including workloads and containers running in the cloud and in private,…
Secureworks launches Cloud Configuration Review
Secureworks announced at RSA Conference 2020 the launch of its new cloud configuration assessment. Based on VMware Secure State, the solution addresses pervasive security challenges in public cloud adoption, including the exposure of critical assets due to the misconfiguration of…
FireMon expands API integrations for increased security, flexibility
FireMon announced at RSA Conference 2020 expanded capabilities for API integrations with ServiceNow, Cisco ACI and Swimlane to help customers improve network security visibility, control, and efficiency while maximizing the value of their investments in security and IT service management…
Photos: RSA Conference 2020, part 3
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the event, featured vendors and organization include: RSA, Microsoft,…
DigiCert introduces upgraded TLS certificate, business manager for channel partners
DigiCert, the world’s leading provider of TLS/SSL, IoT and PKI solutions, is upgrading channel partners to DigiCert CertCentral Partner, a comprehensive TLS certificate management solution for cloud and hosted environments. CertCentral helps partners customize and automate all stages of certificate…
CWE list now includes hardware security weaknesses
The Mitre Corporation has released version 4.0 of the Common Weakness Enumeration (CWE) list, which has been expanded to include hardware security weaknesses. About CWE The Common Weakness Enumeration (CWE) is a category system for weaknesses and vulnerabilities. The project…
(ISC)2 partners with ASIAL to raise physical, electronic security awareness in Australia
(ISC)2, the world’s largest nonprofit membership association of certified cybersecurity professionals – announced that it has signed a Memorandum of Understanding with the Australian Security Industry Association Limited (ASIAL) that will strive for the advancement of the information security profession…
A new way for securing web browsers from hackers
A powerful new approach to securing web browsers is getting its first real-world application in the Firefox browser. Developed by a team of researchers from The University of Texas at Austin, the University of California San Diego, Stanford University and…
Modern malware is increasingly leveraging evasive behaviors
Modern malware is increasingly leveraging evasive behaviors, a new report by VMware Carbon Black released at RSA Conference 2020 has revealed. The report uncovers the top attack tactics, techniques, and procedures (TTPs) seen over the last year and provides specific…
What is driving the machine identity crisis?
Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtual machines, containers, microservices, IoT devices…
One in five SMBs use no endpoint security at all
An alarming number of SMBs (small to medium businesses) in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns. One-third of companies with 50 or fewer employees report using free, consumer-grade cybersecurity, and…
Flaw affecting 1B+ Wi-Fi-enabled devices allows attackers to decrypt wireless network packets
ESET researchers have discovered Kr00k (CVE-2019-15126), a previously unknown vulnerability in Wi-Fi chips used in many client devices, Wi-Fi access points and routers. Kr00k is a vulnerability that causes the network communication of an affected device to be encrypted with…
Digital Guardian launches MDR service
Digital Guardian announced at RSA Conference 2020 the launch of its Managed Detection & Response (MDR) service, giving organizations a comprehensive data protection solution with 24/7 access to a team of skilled cybersecurity experts who actively hunt, detect, and mitigate…
Menlo Security announces DLP solution powered by an Isolation Core
Menlo Security, a leader in cloud security, announced the world’s first Data Loss Prevention (DLP) solution powered by an Isolation Core. The solution is available as part of the Global Cloud Proxy Platform built on the company’s patented Isolation Core.…
Imperva launches Advanced Bot Protection solution
Imperva, the cybersecurity leader championing the fight to secure data and applications wherever they reside, announced Advanced Bot Protection, a new solution that fully integrates its industry-leading bot management technology into the Imperva Cloud Application Security solution. The solution enables…
SecBI XDR Platform: Continuous and automated threat detection, investigation and response
With cyber criminals using multiple attack vectors to reach their targets, SecBI, a disruptive player in cyber defense, announced the launch of its XDR Platform, designed for continuous and automated threat detection, investigation and response on all attack vectors, with…
Keysight launches new SecOps platform to improve operational security effectiveness
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced Breach Defense, a security operations (SecOps) platform designed to improve operational security effectiveness. An integral element of the…
Code42 enhances its cloud data security solution to detect data threats caused by high-risk employees
Code42, the leader in insider threat detection, investigation and response, announced it has advanced its cloud data security solution with the second in a series of new capabilities designed to help companies defend against the rising tide of insider threats.…
Devolutions provides enterprise-grade PAM features to SMBs
At RSA Conference 2020, software developer Devolutions is on mission to ensure small and midsized businesses (SMBs) have the tools they need to safeguard data. Leading the way is a Privileged Access Management (PAM) solution called Devolutions Password Server, which…
VMware advances intrinsic security for the world’s digital infrastructure
VMware, a leading innovator in enterprise software, announced new innovations to advance the company’s strategy to make security intrinsic to the digital enterprise. Intrinsic security makes protecting critical applications and data more automated, proactive and pervasive across the entire distributed…
Nozomi Networks improves security and reliability across mixed IT, OT and IoT network environments
Nozomi Networks, the leader in OT and IoT security, announced at RSA Conference 2020 its v20.0 product portfolio release. With this latest release, the industry’s most advanced solution for OT network visibility and real-time cybersecurity now includes new groundbreaking anomaly…
FireMon’s Azure, AWS integrations improve security policies for multi-cloud environments
As enterprises increasingly transition and scale their operations in the public cloud, at RSA Conference 2020 FireMon announced new integrations with Microsoft Azure and Amazon Web Services (AWS) to help improve cloud visibility, reduce complexity and match the pace needed…
Photos: RSA Conference 2020, part 2
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part one of the photos is available here. Here are a few photos from the…
Attackers probing for vulnerable Microsoft Exchange Servers, is yours one of them?
CVE-2020-0688, a remote code execution bug in Microsoft Exchange Server that has been squashed by Microsoft in early February, is ripe for exploitation and could become a vector for ransomware groups in coming months, warns cybersecurity researcher Kevin Beaumont. Organizations…
Shadow IoT: A growing threat to enterprise security
Zscaler released their second annual IoT report, compiled after analyzing their customers’ IoT transactions in the Zscaler cloud for two weeks. The company found 553 different IoT devices across 21 categories from 212 manufacturers. Organizations around the world are observing…
Google fixes another Chrome zero-day exploited in the wild
For the third time in a year, Google has fixed a Chrome zero-day (CVE-2020-6418) that is being actively exploited by attackers in the wild. About CVE-2020-6418 No details have been shared about the attacks and about the flaw itself, apart…
Almost three-quarters of all phishing sites now use SSL protection
The total number of phishing sites detected by the Anti-Phishing Working Group (APWG) worldwide in October through December 2019 was 162,155, following the all-time-high of 266,387 attacks recorded in July through September 2019. Most menacing, however, were targeting trends exhibited…
Mixed-signal circuits can stop side-channel attacks against IoT devices
Purdue University innovators have unveiled technology that is 100 times more resilient to electromagnetic and power attacks, to stop side-channel attacks against IoT devices. Securing IoT devices against side-channel attacks Security of embedded devices is essential in today’s internet-connected world.…
Combat complexity to prevent cybersecurity fatigue
In today’s security landscape, the average company uses more than 20 security technologies. While vendor consolidation is steadily increasing with 86 percent of organizations using between 1 and 20 cybersecurity vendors, more than 20 percent feel that managing a multi-vendor…
Healthcare industry at greatest risk of data breach
The healthcare industry has significantly more exposed attack surfaces than any other industry surveyed, according to Censys’s research findings of cloud risks and cloud maturity by industry, revealed at RSA Conference 2020. Leveraging the Censys SaaS Platform, company researchers measured…
BlackBerry launches new UES platform for zero trust
BlackBerry announced at RSA Conference 2020 the BlackBerry Spark platform with a new unified endpoint security (UES) layer which can work with BlackBerry UEM and other unified endpoint management (UEM) solutions to deliver BlackBerry’s One Agent, One Console, One Crowd,…
GreatHorn unveils biometric solution with keystroke analysis to match typing patterns
GreatHorn, the leading cloud email security provider focused on managing risk from advanced email threats, unveiled the first and only biometric solution that effectively identifies compromised accounts and blocks takeover attempts by validating users with their unique typing patterns. The…
Intertrust launches enterprise-ready white-box cryptography solution for web apps
Intertrust announced the launch of whiteCryption Secure Key Box (SKB) for Web at the RSA Conference 2020. The first and only enterprise-ready white-box cryptography solution for web applications, it ensures that web apps can be used without fear of exposing…
Adaptiva launches Endpoint Health, its automated endpoint health and remediation solution
Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced Endpoint Health, its automated endpoint health and remediation solution for clients and servers. The comprehensive Endpoint Health product runs 111 health checks enterprise-wide within minutes.…
Securonix Analytics Sandbox: An isolated test environment for security operations teams
Securonix, a leader in next-gen SIEM, announced at RSA Conference 2020 the launch of the Securonix Analytics Sandbox capability. The new capability provides an isolated test or QA environment within the production setup for security operations teams to test, tune,…
QuoLab releases collaborative, data-centric security operations platform
QuoLab Technologies enters the market with a collaborative, data-centric security operations platform. Born from EU-based services company, QuoScient, QuoLab provides solutions to the most pressing security challenges of our time; affording the ability to process data at scale and enable…