The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be challenging to track and assess. That’s why each year the WatchGuard Threat Lab…
Tag: Help Net Security
The future of DNS security: From extremes to a new equilibrium
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to internet pioneer Dr. Paul Vixie, Farsight Security Chairman and CEO. Dr. Vixie was inducted into the internet Hall of Fame in 2014 for work related…
Study: The Blind Spots of Email Security
Malicious files and links regularly bypass email security products, leaving enterprises vulnerable to email-based attacks. Increased use of automation allows attackers to create many ‘mutations’ for each malware or malicious file, potentially inundating email security products with new unknown threats.…
CipherCloud CASB+ for Slack: Visibility, protection and control of all user activity on Slack
CipherCloud, a leader in cloud security and governance, announced the availability of CASB+ for Slack, enabling secure collaboration and communication for the industry’s leading messaging application. CASB+ for Slack provides 360o visibility, protection and control of all user activity on…
Dynatrace enhances its Digital Business Analytics module to process business KPIs
Software intelligence company, Dynatrace announced new enhancements to its Digital Business Analytics module. The Dynatrace explainable AI engine, Davis, has been expanded to process business KPIs, such as revenue trends, customer conversions and churn. In addition, Dynatrace now enables one-click…
Okta hires Craig Weissman as Chief Architect
Okta, the leading independent provider of identity for the enterprise, announced the hiring of Craig Weissman as Chief Architect, effective immediately. Weissman brings a proven track record of more than 20 years leading enterprise software development and cloud architecture, having…
Elevate Security appoints Nicholas Telford as chief financial officer
Elevate Security, a platform that measures, influences, and reduces human cybersecurity risk, announced the appointment of Nicholas (Nick) Telford as chief financial officer. Telford will oversee Elevate Security’s long-term financial strategy, providing oversight and a roadmap to the organization’s growth…
Week in review: Most exploited vulns in 2019, Emotet sprads via Wi-Fi, Patch Tuesday forecast
Here’s an overview of some of last week’s most interesting news and articles: CDPwn vulnerabilities open millions of Cisco enterprise devices to attack If you have Cisco equipment in your enterprise network – and chances are good that you have…
Phishers impersonate WHO, exploit coronavirus-related anxiety
Media outlets are reporting daily on the coronavirus outbreak in Wuhan and the emergency repatriation of foreign citizens that found themselves in the thick of it. As cases of the virus infection keep popping up across the world – demonstrating…
February 2020 Patch Tuesday forecast: A lot of love coming our way
The January 2020 Patch Tuesday was a light one as predicted; everyone was still catching up from the end-of-year holidays. As we gain momentum into February and move towards Valentine’s Day, I anticipate Microsoft, and at least Mozilla, will give…
New infosec products of the week: February 7, 2020
USB armory Mk II: A secure computer on a USB stick featuring open source hardware design The USB armory Mk II’s security features include internal and external cryptographic coprocessors, a true random number generator, secure boot capabilities, and more. These…
Review: Cyber Minds
Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some useful tips for you. Aside from being a prominent cybersecurity executive, speaker,…
Discrepancies between data sanitization policy creation and execution put data at risk
Although 96 percent of the 1,850 senior leaders within large organizations have a data sanitization policy in place, 31 percent have yet to communicate it across the business, according to a Blancco survey. Twenty percent of respondents also don’t believe…
43% of cloud databases are currently unencrypted
Palo Alto Networks released research showing how vulnerabilities in the development of cloud infrastructure are creating significant security risks. Alerts and events for organizations operating in the cloud The Unit 42 Cloud Threat Report: Spring 2020 investigates why cloud misconfigurations…
In 2020, 5G deployments will continue at a frantic pace
The implementation of massive MIMO in 5G systems is changing, according to a Mobile Experts report. There’s a shift away from the dominant position of 64T64R mMIMO, toward 32T32R systems. During initial 5G system roll-outs, the distinct preference was to…
LogicHub launches MDR+ to provide flexible end-to-end detection and response
LogicHub, the provider of the industry’s most complete security automation solution, unveiled MDR+, its automation-driven Managed Detection and Response (MDR) solution. LogicHub’s MDR+ goes beyond traditional MDR solutions through monitoring an organization’s environment 24×7 by integrating with every tool throughout…
Enea Unified Data Manager: A cloud-native network function for 4G and 5G data management
Enea launched the Enea Unified Data Manager, a hardware-agnostic, cloud-native network function for 4G and 5G data management. The software performs the 3GPP functions of Unified Data Management (UDM) in 5G networks and interoperates with any Home Subscriber Server (HSS)…
Keysight and Samsung collaborate to accelerate mobile operators’ deployment of 5G services
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced an extended collaboration with Samsung Electronics’ LSI Business, a global leader in semiconductor components and 5G technology, to…
Sysnet secures funding to support growth and accelerate development of security product offerings
Sysnet Global Solutions, the leading provider of cyber security and compliance solutions operating in over 60 countries worldwide, announced it has secured a significant growth equity investment led by FTV Capital, a growth equity firm with a successful track record…
Nexthink appoints new CTO, two additional board members, and a new Chairman
Nexthink, the leader in digital experience management software, announced the appointment of a new Chief Technology Officer, two additional board members and a new Chairman to help fuel the company’s next stage of growth and innovation. Vedant Sampath has been…
Michel Robert joins Epsilon as Group Chief Executive Officer
Epsilon, a global connectivity and communications service provider, has appointed Michel Robert as its Group Chief Executive Officer, with immediate effect. Bringing more than two decades of technology experience, Michel will lead Epsilon’s executive leadership team to build on Epsilon’s…
Emotet can spread to poorly secured Wi-Fi networks and computers on them
Here’s yet another reason to secure Wi-Fi networks and Windows user accounts with a strong enough password: researchers have spotted and analyzed a variant of the Emotet Trojan that is able to spread to nearby wireless networks and compromise computers…
Honware: IoT honeypot for detecting zero-day exploits
Two researchers have created a solution that could help security researchers and IoT manufacturers with detecting zero-day exploits targeting internet-connected devices more speedily than ever before. It’s called honware, and it’s a virtual honeypot framework that can emulate Linux-based Customer…
Which vulnerabilities were most exploited by cybercriminals in 2019?
Which ten software vulnerabilities should you patch as soon as possible (if you haven’t already)? Table of top exploited CVEs between 2016 and 2019 (repeats are noted by color) Recorded Future researchers have analyzed code repositories, underground forum postings, dark…
The Goldilocks principle for zero trust fraud prevention
According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at any time.” In the Identity and Access Management (IAM) world, zero trust is all…
Cyberattackers decreased their activity at the end of 2019, but only to change tactics
Attackers know that humans are still the weakest link. Across the board, malicious cyber-activity was down partly as a result of hectic holiday schedules and vacations with fewer employees around to interact with malicious activity. However, this decrease in activity…
How IoT devices open a portal for chaos across the network
Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, Germany, Spain, the Netherlands and UAE to understand the state of shadow IoT…
Acunetix 13 web app security scanner comes with many innovations
Acunetix 13 comes with an improved user interface and introduces innovations such as the SmartScan engine, malware detection functionality, comprehensive network scanning, proof-of-exploit, incremental scanning, and more. Unparalleled performance Scanning complex web applications using traditional web vulnerability scanners may take…
NCP Secure Enterprise Management Server now supports 2FA through a web interface
NCP engineering released version 5.30 of the Secure Enterprise Management Server (SEM), a central component of the NCP Next Generation Network Access Technology that serves as a single point of administration. Using this technology, companies can manage their remote access…
Secure Code Warrior and Manicode Security to lead Learning Lab at RSA Conference 2020
The RSA Conference Learning Labs are designed to offer full conference pass attendees facilitated experiences to immerse attendees in interactive exercises and discussions. Attendance to each of the nearly 20 labs being offered at this year’s conference is limited, ensuring…
Wind River and T-Systems deliver 5G cloud network management
Wind River, a leader in delivering software for the intelligent edge, announced that T-Systems is using Wind River Cloud Platform edge cloud infrastructure software for its EdgAIR secure and high-performance edge computing platform. A Deutsche Telekom subsidiary, T-Systems is a…
Samsung introduces high-performing DRAM, helps advance supercomputers, AI-driven data analytics
Samsung announced the market launch of Flashbolt, its third-generation High Bandwidth Memory 2E (HBM2E). The new 16-gigabyte (GB) HBM2E is uniquely suited to maximize high performance computing (HPC) systems and help system manufacturers to advance their supercomputers, AI-driven data analytics…
NTT DATA Services enters strategic collaboration agreement with AWS
NTT DATA Services announced it has entered into a three-year, strategic collaboration agreement with Amazon Web Services, to deliver new products, services and solutions designed to accelerate cloud transformations. Through this collaboration, NTT DATA can provide clients with advisory and…
Aon acquires Cytelligence, a firm with deep expertise in cyber incident response
Aon announced the acquisition of Cytelligence, a Canadian-based cyber security firm that provides incident response advisory, digital forensic expertise, security consulting services and cyber security training for employees to help organizations respond to cyber security threats and strengthen their security…
Automox raises $30 million to automate endpoint hardening
Automox has raised $30 million in Series B funding. The round was led by Koch Disruptive Technologies (KDT), with participation from CRV and CrowdStrike, which is investing through the Falcon Fund in partnership with Accel. Automox will use the capital…
CDPwn vulnerabilities open millions of Cisco enterprise devices to attack
If you have Cisco equipment in your enterprise network – and chances are good that you have – you should check immediately which feature the newly revealed CDPwn vulnerabilities in Cisco’ proprietary device discovery protocol and implement patches as soon…
RSAC Launch Pad 2020 participants revealed
Three cybersecurity startups have been selected to participate in the RSAC Launch Pad 2020. The event gives early stage startups a platform to introduce their potentially groundbreaking solutions to high-profile venture capitalists in a Shark Tank-style format, all in front…
USB armory Mk II: A secure computer on a USB stick featuring open source hardware design
The hardware security professionals at F-Secure have created a new version of the USB armory – a computer on a USB stick built from the ground up to be secure. USB armory Mk II The USB armory Mk II entrenches…
Touch panels deployed in critical infrastructure vulnerable to remote attacks
Manufacturing facilities and processing centers using AutomationDirect C-more Touch Panels are advised to upgrade their firmware ASAP, as older versions contain a high-risk vulnerability (CVE-2020-6969) that may allow attackers to get account information such as usernames and passwords, obscure or…
How can we harness human bias to have a more positive impact on cybersecurity awareness?
Dr. Jessica Barker, Co-CEO of Cygenta, follows her passion of positively influencing cybersecurity awareness, behaviours and culture in organisations around the world. Dr. Barker will be speaking about the psychology of fear and cybersecurity at RSA Conference 2020, and in…
HECVAT toolkit helps higher education institutions assess cloud adoption risks
Higher education institutions are increasingly adopting cloud-based solutions in order to lower costs, improve performance and productivity, and increase flexibility and scalability. Before settling on a solution, though, they must assess it for security and privacy needs, including some that…
Malware and ransomware attack volume down due to more targeted attacks
Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, author and deploy stealth-like attacks with increasing precision, while growing their capabilities to evade detection by sandbox technology,”…
Lack of .GOV validation and HTTPS leaves states susceptible to voter disinformation campaigns
There’s a severe lack of U.S. government .GOV validation and HTTPS encryption among county election websites in 13 states projected to be critical in the 2020 U.S. Presidential Election, a McAfee survey reveals. Example of what a fraudulent email might…
Mobile data roaming traffic generated by consumer and IoT devices expected to surge
Mobile data roaming traffic generated by consumer and IoT devices reached 737 Petabytes in 2019, according to Kaleido Intelligence. This is forecast to reach 2,000 Petabytes in 2024, representing an average annual growth of 22% over the period. Leading vendors…
Cynet announces special offer for Symantec customers
Cynet announced a special offering for Symantec customers, enabling them to seamlessly switch to Cynet 360. Any Symantec customer with a coming license renewal in 2020 can switch to Cynet now and their Cynet license will begin counting only from…
Yubico YubiEnterprise Services: Helping orgs to deploy strong authentication at scale
Yubico, the leading provider of hardware authentication security keys, announced the initial availability of YubiEnterprise Services, the company’s first service-based offering designed to transform the way that enterprises purchase, distribute and manage YubiKeys. With subscription and delivery self-service options, YubiEnterprise…
Radiflow iRISK: Business-driven industrial risk analytics service for OT networks
Radiflow, a leading provider of cybersecurity solutions for industrial automation networks, announced that the company has launched iRISK, a new business-driven industrial risk analytics service for OT networks. iRISK is designed to provide comprehensive vulnerability assessment reporting for OT networks,…
Xton Access Manager now includes RDP, SSH and HTTP proxy support
Xton Technologies, a provider of privileged access management solutions, announced that Xton Access Manager (XTAM) now includes advanced proxy support for RDP, SSH and web proxies allowing customers to create secure, high trust remote sessions with full session recording and…
STEALTHbits’ free program helps orgs mitigate risks associated with Microsoft’s pending AD update
STEALTHbits, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announced a free program designed to help organizations mitigate the risks of operational outage associated with Microsoft’s pending update…
NETSCOUT enables streamline monitoring and reduces risk through greater visibility across the network
NETSCOUT, a leading provider of service assurance, security, and business analytics, announced the availability of its 7000 series nGenius Packet Flow Switches (PFS 7000 Series), nGenius Decryption Appliance (nDA), NETSCOUT External PowerSafe Tap (EPT) and PFS Monitor, which enable unified…
Forter Loyalty Program Protection solution helps merchants tackle attacks on rewards programs
Forter, the leader in e-commerce fraud prevention, announced availability of the Forter Loyalty Program Protection solution to protect high value rewards programs from fraud and abuse, enabling merchants to offer enhanced programs with the best possible customer experience. Loyalty program…
Avaya and RingCentral simplify communication and collaboration through multiple channels
Avaya Holdings, a global leader in solutions to enhance and simplify communications and collaboration, and RingCentral, a leading provider of global enterprise cloud communications, collaboration and contact center solutions, introduced Avaya Cloud Office by RingCentral. Together, Avaya and RingCentral are…
TRIMEDX partners with CyberVista to launch a cybersecurity training program
TRIMEDX is pleased to announce a comprehensive cybersecurity training program specifically designed to address the ever-growing threat of cyberattacks on connected medical devices. TRIMEDX will partner with CyberVista, a cybersecurity education and workforce development company, in launching its CE CYBER…
Miller Kaplan acquires Citadel to offer clients information security analyses and expertise
Miller Kaplan, a top-100 certified public accounting firm, is pleased to announce that effective January 1, 2020, the firm has acquired Citadel Information Group – a Los Angeles-based company dedicated to providing information security management services to businesses and the…
Aliaswire names Jed Rice as CEO
Aliaswire, a leader in innovative cloud-based payments technology, announced that Jed Rice has been named CEO and been appointed to its Board of Directors, effective January 20. Rice joins the Aliaswire team as the company enters a new phase of…
Deepak Ahuja joins NetApp’s Board of Directors
NetApp announced that Deepak Ahuja, CFO of Verily, has joined its Board of Directors. Mr. Ahuja’s appointment brings the number of directors on the NetApp board to eight, seven of whom are independent. “I am pleased to welcome Deepak to…
LexisNexis Risk Solutions enhances its fraud and identity offering with the acquisition of Emailage
LexisNexis Risk Solutions, part of RELX, announced it has entered into an agreement to acquire Emailage, a global provider of fraud prevention and risk management solutions. Emailage will become a part of the Business Services group of LexisNexis Risk Solutions.…
Network Data Systems promotes Wayne Dumas to COO and Craig Johnson to VP of Worldwide Sales
Network Data Systems (NDS), an industry leader in IT infrastructure service solutions, is excited to announce the recent promotions of Wayne Dumas to COO and Craig Johnson to Vice President of Worldwide Sales. Wayne Dumas has been a member of…
Elastic App Search: Complete search solution with relevance tuning and analytics built in
Elastic, the company behind Elasticsearch and the Elastic Stack, announced the general availability of Elastic App Search on Elasticsearch Service. Elastic App Search is a ready-to-use, fully complete search solution with user-friendly relevance tuning and analytics built in. And starting…
New ransomware targets industrial control systems
With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various security outfits have been analyzing EKANS (aka Snake) since it emerged in…
State-sponsored actors may have abused Twitter API to de-anonymize users
A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to phone numbers and potentially de-anonymize certain users. How did it…
How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff that CISOs’ nightmares are made of. As devastating as such incidents can be, for the short…
What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping cyberattacks and finding and fixing breaches fast enough to lower the impact, according to a report from Accenture.…
Scientists test forensic methods to acquire data from damaged mobile phones
Criminals sometimes damage their mobile phones in an attempt to destroy data. They might smash, shoot, submerge or cook their phones, but forensics experts can often retrieve the evidence anyway. Now, researchers at the National Institute of Standards and Technology…
Automation is advancing faster than the enterprise knowledge required to support it
Automation is transforming the enterprise around the globe, directly impacting the bottom line as a result of improved productivity and efficiency, according to UiPath. But automation’s impact on the workplace is not well understood and cannot be ignored: automation raises…
Zyxel launches ZyWALL VPN1000 VPN Firewall, an all-in-one security solution for SMBs
Zyxel Communications, a leading provider of secure broadband networking, Internet access and connected home products, announced the launch of the ZyWALL VPN1000 VPN Firewall, an all-in-one security solution for small and medium businesses. The flagship of the growing Zyxel family…
Trend Micro and Baker Hughes collaborate to help deliver protection for critical infrastructure
Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry…
Wuhan coronavirus exploited to deliver malware, phishing, hoaxes
The Wuhan coronavirus continues to spread and create anxiety across the globe, allowing malicious individuals and groups to exploit the situation to spread fake news, malware and phishing emails. Malicious coronavirus-themed campaings IBM X-Force says that Japanese users have been…
Layering diverse defenses is crucial for stopping email attacks
Despite heading a company that provides a technological solution for stopping targeted email attacks, Evan Reiser, CEO of Abnormal Security, knows that technology is not the complete answer to the malicious email problem. At the same time, security awareness and…
Three principles regarding encryption you need to keep in mind
Encryption is a popular topic among security professionals and occasionally a polarizing one. Plenty of misconceptions surround the process, and these often skew the way people perceive its complexity. For instance, we’ve encountered many IT and business leaders who assume…
The current landscape for supporting innovation in cybersecurity in the EU
Innovation in cybersecurity is a key enabler to facilitate progress in the NIS industry, boost employment in the cybersecurity sector and growth of EU GDP. ENISA published a report that analyses the current landscape for supporting innovation in cybersecurity in…
Interconnectivity and networking predictions for 2020 and beyond
Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges of on-demand compute and storage, the migration of enterprise workloads across multiple cloud services, the imminence of 5G and…
Do your employees feel valued? 64% have one foot out the door
The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies…
Now available: eSentire’s 2019 Annual Threat Intelligence Report
Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as practical recommendations for readers seeking to understand and better respond to the cybersecurity threat landscape. By shining…
DigiCert launches two new PKI tools to provide fast, flexible PKI deployment
DigiCert announced two new PKI tools: IoT Device Manager and Enterprise PKI Manager. Unlike PKI applications of the past, both PKI managers use a container-based, cloud-agnostic implementation that ensures fast and flexible on-premises, cloud and hybrid PKI deployments. These new…
Absolute is strengthening endpoint resilience for its customers
Absolute, the leader in endpoint resilience, announced the company is extending the power of its Resilience solution and patented Persistence technology to a growing ecosystem of leading endpoint security applications. Leveraging its firmware-embedded capabilities in more than 500 million endpoint…
Imply 3.2: Deploy and manage the Imply platform on private and public cloud services
Imply, the real-time intelligence company, announced general availability of Imply 3.2, which leverages the power and flexibility of Docker containers and Kubernetes orchestration to help enterprises easily deploy and manage the Imply platform on private and public cloud services, including…
Login VSI adds app load testing to its continuous desktop and app testing platform
Login VSI, the company dedicated to maximizing the end-user experience, announced the general availability of Login Enterprise 4.0 (formerly called Login PI). This release adds application load testing to its continuous desktop and application testing platform. Login VSI increases the…
Delta Risk and CrowdStrike help clients strengthen their cyber security posture to detect and prevent attacks
Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has joined the CrowdStrike Elevate Partner Program. Delta Risk will offer CrowdStrike’s industry-leading next-generation endpoint protection platform, threat intelligence, and response services to help customers stop breaches.…
Radiflow and Fraunhofer develop ML and AI methods for industrial cybersecurity
Radiflow, a leading provider of cybersecurity solutions for industrial automation networks, and the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation (Fraunhofer IOSB), a prominent research institute for applied science in Germany, announced the launch of a joint research…
QinetiQ sells entire Quantum Key Distribution patent portfolio to Qubitekk
Quantum communication pioneer, Qubitekk, further strengthened its patent portfolio around Quantum Key Distribution technology. QinetiQ, a British multinational defense technology company, has signed an agreement to sell its entire Quantum Key Distribution (QKD) patent portfolio to Qubitekk. The portfolio includes…
Aquant raises $30M to support growth, drive AI innovation, and accelerate global expansion
Aquant, the leading service intelligence platform, announced the close of a $30 million Series B funding round. This latest round of funding was led by Insight Partners with participation from existing investors including Lightspeed Venture Partners, Angular Ventures, and Silvertech…
eSentire appoints Charles “C.J.” Spallitta as Chief Product Officer
eSentire, the global leader in cloud-delivered Managed Detection and Response (MDR), announced the appointment of Charles “C.J.” Spallitta as the company’s new Chief Product Officer, effective immediately. Spallitta will be responsible for eSentire’s entire product portfolio including vision, strategy and…
Patrick Bruce-Lockhart joins Softchoice as Vice President of Sales
Softchoice, a leading North American provider of IT solutions and managed services, announced the appointment of Patrick Bruce-Lockhart, a seasoned technology leader, as a Vice President in its Sales organization. He will report to Kevin Hendrick, Senior Vice-President, Sales. Bruce-Lockhart…
Week in review: UN hacked, new Kali Linux release, Win7 upgrade dilemma
Here’s an overview of some of last week’s most interesting news and articles: Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more! Offensive Security have released Kali Linux 2020.1, which is available for immediate download. Most AV vendors…
Make your own security key with Google’s OpenSK
Google has open-sourced OpenSK, firmware that, combined with an affordable chip dongle, allows you to make your own security key to use for authentication purposes. About OpenSK OpenSK isan open-source implementation for security keys that supports both FIDO U2F and…
Microsoft invites gamers and researchers to new Xbox bug bounty program
Gamers, security researchers, and technologists have been invited to identify security vulnerabilities in Xbox network and services and report them to Microsoft. Bounty rewards will range from $500 to $20,000 USD. Why? Microsoft runs a number of bug bounty programs…
New infosec products of the week: January 31, 2020
Swimlane 10.0: Reducing mean time to detect and response for security incidents The newest release has yielded up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search query response and display rates. Both…
80% of successful breaches are from zero-day exploits
Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or…
Secure 5G networks: EU toolbox of risk mitigating measures
EU Member States have identified risks and vulnerabilities at national level and published a joint EU risk assessment. Through the toolbox, the Member States are committing to move forward in a joint manner based on an objective assessment of identified…
93% of attempted mobile transactions in 2019 were fraudulent
93 percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released by Upstream. The number of malicious apps discovered in 2019 rose…
Researchers develop new optical stealth encryption technology
The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission, has been introduced by BGN Technologies. Time is running out on security and privacy “Today, information…
Kanguru Remote Management Console: Managing and monitoring encrypted USB devices
Managing sensitive data in today’s environment can be a daunting task for IT Security Administrators and organizations. Kanguru Remote Management Console (KRMC) offers a robust solution for IT Security Admins looking to meet high-end security demands by allowing administrators to…
Slice Labs’ new services help insurers protect carriers, businesses, and consumers from risk
Slice Labs, the first on-demand insurance platform, announced four new AI-powered Slice Mind services enabling insurers to more proactively and intelligently protect carriers, businesses, and consumers from risk. Industry prediction It represents the first commercialized approach in the insurance industry…
myDevices’ new panic button technology eliminates the dead zone problem
In 2018, the American Hotel & Lodging Association (AHLA) announced a new workplace safety initiative designed to provide emergency communications and location-based services for employees in the hospitality industry. Backed by major hotels – including Marriott International, InterContinental, Hilton, and…
Semtech releases LoRa-based Asset Tracking Reference Kit
Semtech, a leading supplier of high performance analog and mixed-signal semiconductors and advanced algorithms, announced the release of its Asset Tracking Reference Kit to accelerate the adoption of asset tracking solutions based on LoRa devices and the LoRaWAN protocol, and…
Keysight’s new PROPSIM channel emulator verifies radio links critical for aerospace applications
Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced a new PROPSIM channel emulation solution that enables the aerospace industry to efficiently verify radio links critical to…
Univa Navops Launch 2.0 helps enterprises easily extend HPC workloads to the cloud
Univa, a leading innovator of enterprise-grade workload management and optimization solutions, announced the general availability of Navops Launch 2.0, its flagship cloud-automation platform, designed to help enterprises simplify the migration of HPC and AI workloads to their choice of cloud.…
Concentric launches with a deep learning approach to fixing broken file permissions
Concentric announced the availability of a new approach to the most significant security challenge facing the enterprise today – business-critical unstructured data, stored on-premises or in the cloud, that is impossible to identify and protect manually. Enterprise customers using Concentric…
Fusion Risk Management unveils Fusion Connector for Everbridge Risk Intelligence
Fusion Risk Management, a leading provider of business continuity and risk management software and services, announced the launch of its Fusion Connector for Everbridge Risk Intelligence – powered by NC4, further extending its long-time partnership with Everbridge, the global leader…