Tag: Help Net Security

What the government infosec landscape will look this year

The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be challenging to track and assess. That’s why each year the WatchGuard Threat Lab…

Study: The Blind Spots of Email Security

Malicious files and links regularly bypass email security products, leaving enterprises vulnerable to email-based attacks. Increased use of automation allows attackers to create many ‘mutations’ for each malware or malicious file, potentially inundating email security products with new unknown threats.…

Okta hires Craig Weissman as Chief Architect

Okta, the leading independent provider of identity for the enterprise, announced the hiring of Craig Weissman as Chief Architect, effective immediately. Weissman brings a proven track record of more than 20 years leading enterprise software development and cloud architecture, having…

Elevate Security appoints Nicholas Telford as chief financial officer

Elevate Security, a platform that measures, influences, and reduces human cybersecurity risk, announced the appointment of Nicholas (Nick) Telford as chief financial officer. Telford will oversee Elevate Security’s long-term financial strategy, providing oversight and a roadmap to the organization’s growth…

New infosec products of the week: February 7, 2020

USB armory Mk II: A secure computer on a USB stick featuring open source hardware design The USB armory Mk II’s security features include internal and external cryptographic coprocessors, a true random number generator, secure boot capabilities, and more. These…

Review: Cyber Minds

Humans are an essential part of any enterprise and should be considered the foundation of its cybersecurity. That’s probably easier said than done, but Shira Rubinoff has some useful tips for you. Aside from being a prominent cybersecurity executive, speaker,…

43% of cloud databases are currently unencrypted

Palo Alto Networks released research showing how vulnerabilities in the development of cloud infrastructure are creating significant security risks. Alerts and events for organizations operating in the cloud The Unit 42 Cloud Threat Report: Spring 2020 investigates why cloud misconfigurations…

In 2020, 5G deployments will continue at a frantic pace

The implementation of massive MIMO in 5G systems is changing, according to a Mobile Experts report. There’s a shift away from the dominant position of 64T64R mMIMO, toward 32T32R systems. During initial 5G system roll-outs, the distinct preference was to…

Michel Robert joins Epsilon as Group Chief Executive Officer

Epsilon, a global connectivity and communications service provider, has appointed Michel Robert as its Group Chief Executive Officer, with immediate effect. Bringing more than two decades of technology experience, Michel will lead Epsilon’s executive leadership team to build on Epsilon’s…

Honware: IoT honeypot for detecting zero-day exploits

Two researchers have created a solution that could help security researchers and IoT manufacturers with detecting zero-day exploits targeting internet-connected devices more speedily than ever before. It’s called honware, and it’s a virtual honeypot framework that can emulate Linux-based Customer…

The Goldilocks principle for zero trust fraud prevention

According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at any time.” In the Identity and Access Management (IAM) world, zero trust is all…

Acunetix 13 web app security scanner comes with many innovations

Acunetix 13 comes with an improved user interface and introduces innovations such as the SmartScan engine, malware detection functionality, comprehensive network scanning, proof-of-exploit, incremental scanning, and more. Unparalleled performance Scanning complex web applications using traditional web vulnerability scanners may take…

Wind River and T-Systems deliver 5G cloud network management

Wind River, a leader in delivering software for the intelligent edge, announced that T-Systems is using Wind River Cloud Platform edge cloud infrastructure software for its EdgAIR secure and high-performance edge computing platform. A Deutsche Telekom subsidiary, T-Systems is a…

RSAC Launch Pad 2020 participants revealed

Three cybersecurity startups have been selected to participate in the RSAC Launch Pad 2020. The event gives early stage startups a platform to introduce their potentially groundbreaking solutions to high-profile venture capitalists in a Shark Tank-style format, all in front…

Malware and ransomware attack volume down due to more targeted attacks

Cybercriminals are leveraging more evasive methods to target businesses and consumers, a SonicWall report reveals. “Cybercriminals are honing their ability to design, author and deploy stealth-like attacks with increasing precision, while growing their capabilities to evade detection by sandbox technology,”…

Cynet announces special offer for Symantec customers

Cynet announced a special offering for Symantec customers, enabling them to seamlessly switch to Cynet 360. Any Symantec customer with a coming license renewal in 2020 can switch to Cynet now and their Cynet license will begin counting only from…

Aliaswire names Jed Rice as CEO

Aliaswire, a leader in innovative cloud-based payments technology, announced that Jed Rice has been named CEO and been appointed to its Board of Directors, effective January 20. Rice joins the Aliaswire team as the company enters a new phase of…

Deepak Ahuja joins NetApp’s Board of Directors

NetApp announced that Deepak Ahuja, CFO of Verily, has joined its Board of Directors. Mr. Ahuja’s appointment brings the number of directors on the NetApp board to eight, seven of whom are independent. “I am pleased to welcome Deepak to…

New ransomware targets industrial control systems

With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various security outfits have been analyzing EKANS (aka Snake) since it emerged in…

How CISOs can justify cybersecurity purchases

Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff that CISOs’ nightmares are made of. As devastating as such incidents can be, for the short…

Interconnectivity and networking predictions for 2020 and beyond

Traditional networking and interconnectivity approaches are not handling the pressures being placed on traditional computer networking, according to Stateless. The challenges of on-demand compute and storage, the migration of enterprise workloads across multiple cloud services, the imminence of 5G and…

Do your employees feel valued? 64% have one foot out the door

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies…

Now available: eSentire’s 2019 Annual Threat Intelligence Report

Recently released, eSentire’s 2019 Threat Intelligence Report: Perspectives from 2019 and Predictions for 2020 provides visuals, data and written analysis, as well as practical recommendations for readers seeking to understand and better respond to the cybersecurity threat landscape. By shining…

Absolute is strengthening endpoint resilience for its customers

Absolute, the leader in endpoint resilience, announced the company is extending the power of its Resilience solution and patented Persistence technology to a growing ecosystem of leading endpoint security applications. Leveraging its firmware-embedded capabilities in more than 500 million endpoint…

eSentire appoints Charles “C.J.” Spallitta as Chief Product Officer

eSentire, the global leader in cloud-delivered Managed Detection and Response (MDR), announced the appointment of Charles “C.J.” Spallitta as the company’s new Chief Product Officer, effective immediately. Spallitta will be responsible for eSentire’s entire product portfolio including vision, strategy and…

Patrick Bruce-Lockhart joins Softchoice as Vice President of Sales

Softchoice, a leading North American provider of IT solutions and managed services, announced the appointment of Patrick Bruce-Lockhart, a seasoned technology leader, as a Vice President in its Sales organization. He will report to Kevin Hendrick, Senior Vice-President, Sales. Bruce-Lockhart…

Make your own security key with Google’s OpenSK

Google has open-sourced OpenSK, firmware that, combined with an affordable chip dongle, allows you to make your own security key to use for authentication purposes. About OpenSK OpenSK isan open-source implementation for security keys that supports both FIDO U2F and…

New infosec products of the week: January 31, 2020

Swimlane 10.0: Reducing mean time to detect and response for security incidents The newest release has yielded up to 35X performance improvement in alarm ingestion rates and up to a 60X improvement in search query response and display rates. Both…

80% of successful breaches are from zero-day exploits

Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or…

Researchers develop new optical stealth encryption technology

The first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission, has been introduced by BGN Technologies. Time is running out on security and privacy “Today, information…

Semtech releases LoRa-based Asset Tracking Reference Kit

Semtech, a leading supplier of high performance analog and mixed-signal semiconductors and advanced algorithms, announced the release of its Asset Tracking Reference Kit to accelerate the adoption of asset tracking solutions based on LoRa devices and the LoRaWAN protocol, and…