(IN)SECURE Magazine Notifications RSS

If you haven’t yet patched the BlueKeep RDP vulnerability, do so now

5 hours 18 minutes ago

There is still no public, working exploit code for CVE-2019-0708, a flaw that could allow an unauthenticated remote attacker to execute remote code on a vulnerable target running Remote Desktop Protocol (RDP). But, as many infosec experts have noted, we’re not far off from when one is created and leveraged by attackers in the wild. With the vulnerability being wormable, when it hits, the exploit could end up compromising millions of systems around the world, … More →

The post If you haven’t yet patched the BlueKeep RDP vulnerability, do so now appeared first on Help Net Security.

Zeljka Zorz

Microsoft wants to improve routing security

8 hours 49 minutes ago

The Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society, announced that Microsoft has joined the program whose primary objective is to reduce the most common threats to the Internet’s routing system. Routing security is vital to the future and stability of the Internet. Last year alone, there were 12,600 routing outages or incidents such as route hijacking and leaks that led to large-scale Distributed Denial of Service (DDoS) attacks, stolen … More →

The post Microsoft wants to improve routing security appeared first on Help Net Security.

Industry News

How to write an effective data breach notification?

10 hours 24 minutes ago

Data breach notifications sent by companies to affected customers are often unclear and not very helpful, University of Michigan researchers have found. The problem(s) The researchers have analyzed 161 data breach notifications sent by companies to US consumers between January and June 2018, and discovered that: Most were lengthy and would be difficult to understand for the general public (they require advanced reading skills). Many companies downplay or obscure the likelihood of the receiver being … More →

The post How to write an effective data breach notification? appeared first on Help Net Security.

Zeljka Zorz

Data privacy: A hot-button issue for Americans one year after GDPR

10 hours 39 minutes ago

The General Data Protection Regulation (GDPR) went into effect in the European Union a year ago this month. GDPR, which gives EU citizens more control over their personal data by mandating how businesses must handle that information, has attracted great interest around the world. In addition, it has inspired government officials elsewhere in the world to develop laws addressing consumer data privacy concerns. In recognition of GDPR’s first anniversary, nCipher Security conducted a survey to … More →

The post Data privacy: A hot-button issue for Americans one year after GDPR appeared first on Help Net Security.

Help Net Security

Cybercriminals continue to evolve the sophistication of their attack methods

10 hours 54 minutes ago

Cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding for some attacks, to living-off-the-land (LoTL) or sharing infrastructure to maximize their opportunities, according to the Fortinet latest report. Pre- and post-compromise traffic Research to see if threat actors carry out phases of their attacks on different days of the week demonstrates that cybercriminals are always looking to maximize opportunity to their benefit. When comparing Web filtering volume for … More →

The post Cybercriminals continue to evolve the sophistication of their attack methods appeared first on Help Net Security.

Help Net Security

Companies increasingly investing in container adoption, security remains an issue

11 hours 9 minutes ago

87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their application portfolio in containers — an impressive increase from two years ago, when just 67 percent of teams were running container technologies in production, a Portworx and Aqua Security survey reveals. Hurdles Yet despite their pervasiveness, containers aren’t without hurdles: when asked to name their top … More →

The post Companies increasingly investing in container adoption, security remains an issue appeared first on Help Net Security.

Help Net Security

Number of connected devices reached 22 billion, where is the revenue?

11 hours 24 minutes ago

The number of devices connected to the internet reached 22 billion worldwide at the end of 2018, according to the latest research from Strategy Analytics. Enterprise IoT remains the leading segment, accounting for more than half of the market, with Mobile/Computing at just over a quarter. The report predicts, however, that Home will be the fastest growing segment over the coming years, driven by further rapid growth in smart home adoption, particularly in as-yet untapped … More →

The post Number of connected devices reached 22 billion, where is the revenue? appeared first on Help Net Security.

Help Net Security

Portworx adds new backup and recovery features to its cloud-native storage and data management platform

12 hours 24 minutes ago

Portworx, the cloud-native storage and data management company modern enterprises trust to manage data in containers, announced Portworx Enterprise 2.2, an update to its cloud-native storage and data management platform with new features focused on security, data protection, and disaster recovery. With this update, Portworx Enterprise provides a one-command backup and recovery experience for complex applications running on Kubernetes, giving enterprises more control over their mission-critical data. With these new capabilities, Portworx is radically expanding … More →

The post Portworx adds new backup and recovery features to its cloud-native storage and data management platform appeared first on Help Net Security.

Industry News

Stratoscale enhanced platform delivers multi-cloud hybrid computing functionality

13 hours 25 minutes ago

Hybrid cloud infrastructure provider Stratoscale announced the latest version of its namesake platform. Stratoscale V5 delivers key functionality that brings the company a step closer to its vision of multi-cloud hybrid computing, which aims to break down walls separating enterprise environments and the public cloud, applying the cloud-native paradigm across all environments. It offers operational agility for legacy applications and accelerates application development for new ones. The public cloud has become the new operating system … More →

The post Stratoscale enhanced platform delivers multi-cloud hybrid computing functionality appeared first on Help Net Security.

Industry News

Tufin Orchestration Suite release features policy-based automation for server policy cloning

13 hours 54 minutes ago

Tufin, a company pioneering a policy-centric approach to security and IT operations, announced the release of Tufin Orchestration Suite R19-1, advancing its leadership in network security automation with the industry’s first solution to feature policy-based automation for server policy cloning. Enterprises today devote significant time and resources to processing access requests related to server policy cloning during application migration. With its new server policy cloning capabilities, the latest version of the award-winning Tufin Orchestration Suite … More →

The post Tufin Orchestration Suite release features policy-based automation for server policy cloning appeared first on Help Net Security.

Industry News

How small businesses can keep their data secure

14 hours 10 minutes ago

In the age of technology, it can be harder than ever to keep your data safe. Not only that, it’s also more important than ever to secure your data. However, your small business likely does not have the same resources to put toward data protection as larger competitors, which can easily invite catastrophe. However, if you know how to use the resources that you do have, you can easily secure your data without breaking the … More →

The post How small businesses can keep their data secure appeared first on Help Net Security.

Help Net Security

Dynatrace’s open AI engine now supports Kubernetes

14 hours 24 minutes ago

Software intelligence company Dynatrace, announced that its open AI engine, Davis, now provides even smarter and more precise answers and actionable insights about Kubernetes environments. Through automatically ingesting new Kubernetes cluster and node health, and utilization metrics into Davis and combining them with the rich, high-fidelity application and transaction data that Dynatrace already collects, enterprises can create successful Kubernetes deployments, accelerate innovation through DevOps and increase competitiveness by bringing new services to market faster. New, … More →

The post Dynatrace’s open AI engine now supports Kubernetes appeared first on Help Net Security.

Industry News

Citrix to extend Citrix Workspace to Google Cloud

14 hours 55 minutes ago

The race to the cloud is on and it’s about to pick up speed. Citrix Systems announced plans to extend Citrix Workspace to Google Cloud, expanding the flexibility and choice companies have in transitioning to the cloud by enabling them to quickly and efficiently deliver apps to Google devices and operating systems and create a superior digital work experience that unleashes productivity and innovation. The news came during Citrix Synergy, the premier digital work conference … More →

The post Citrix to extend Citrix Workspace to Google Cloud appeared first on Help Net Security.

Industry News

Monkton deploys new app for source code management, CI/CD, security scanning to USAF

15 hours 24 minutes ago

Monkton, the market leader for secure, NIAP Compliant mobile apps, has deployed the first mobile app in the U.S. Air Force (USAF) that enables maintainers to perform their work directly on the flight line with mobile devices. “This is a huge win for our Department of Defense, aligning directly with the mandate of increasing air readiness,” commented Harold Smith III, CEO and co-founder of Monkton, Inc. He continued, “The project started off on the 5-yard … More →

The post Monkton deploys new app for source code management, CI/CD, security scanning to USAF appeared first on Help Net Security.

Industry News

Jumio and Nok Nok Labs to offer account recovery solution

15 hours 54 minutes ago

Jumio, the leading AI-powered trusted identity as a service provider, announced a new partnership with Nok Nok Labs, the trusted leader in next generation authentication. With the fully integrated Nok Nok S3 Suite and Jumio’s identity verification technologies for account recovery, customers can avoid difficult, time-consuming custom integrations and instead leverage the integrations of email- and SMS-based one-time passcode (OTP). Every year tens of millions of smartphones, including company-issued phones, are lost or stolen, with … More →

The post Jumio and Nok Nok Labs to offer account recovery solution appeared first on Help Net Security.

Industry News

CloudBees raises more than $120M in funding

16 hours 24 minutes ago

CloudBees, an enterprise DevOps leader powering the continuous economy, announced that it has secured a $10 million capital investment from HSBC, one of the world’s largest banking and financial services organizations. This announcement is a follow-on to CloudBees’ recent $62 million growth capital round last year, bringing total funding in the company to over $120 million. HSBC currently uses CloudBees Core platform technologies to accelerate its overall software delivery system. HSBC said the investment in … More →

The post CloudBees raises more than $120M in funding appeared first on Help Net Security.

Industry News

Veeam Availability Orchestrator v2 to help orgs address operational, DR and data migration scenarios

16 hours 55 minutes ago

Veeam Software, the leader in Backup solutions that deliver Cloud Data Management to over 350,000 organizations globally, announced the general availability of new Veeam Availability Orchestrator v2. The latest version expands its powerful orchestration and automation capabilities to a broader set of applications and VMs, helping organizations address a variety of operational and disaster recovery (DR) and data migration scenarios. Never have organizations been so dependent on their data, and yet DR used to only … More →

The post Veeam Availability Orchestrator v2 to help orgs address operational, DR and data migration scenarios appeared first on Help Net Security.

Industry News

Official Tor Browser for Android available on Google Play

1 day 5 hours ago

The Tor Project has released the first stable version of the Tor Browser for Android. The release is referred to as version 8.5, mainly to prevent confusion: Tor Browser releases for Windows, macOS, and Linux are currently on that version. About Tor Browser for Android The Tor Project released an alpha version of the app in September 2018 and has been working on tweaking it ever since. “Mobile browsing is increasing around the world, and … More →

The post Official Tor Browser for Android available on Google Play appeared first on Help Net Security.

Zeljka Zorz

Google has been storing unhashed G Suite customer passwords

1 day 7 hours ago

Google has discovered that it has been storing some G Suite users’ passwords in clear text and is notifying G Suite administrators that it will force a password change if the affected passwords haven’t been changed in the meantime. What happened? Google discovered two separate issues, both of which affect only business users. The first arose in 2005, due to a legacy function that enabled G Suite Domain Admins to view user passwords: The second … More →

The post Google has been storing unhashed G Suite customer passwords appeared first on Help Net Security.

Zeljka Zorz

Getting ready for digital transformation: The biggest cybersecurity challenges

1 day 10 hours ago

Digital transformation (DX) is becoming the largest driver of new technology investments and projects among businesses and IDC forecasts that global spending on DX will reach $1.18 trillion in 2019. But DX efforts come with many challenges that need to be effectively addressed so as not to hamper the success of companies’ digital transformation program and strategies. Convincing the leaders Those who have yet to start the process, the initial mission must be to make … More →

The post Getting ready for digital transformation: The biggest cybersecurity challenges appeared first on Help Net Security.

Zeljka Zorz

Freelancing

Tasker: Total Automation for Android