(IN)SECURE Magazine Notifications RSS

VMware acquires Carbon Black

23 hours 29 minutes ago

VMware and Carbon Black announced that the companies have entered into a definitive agreement by which VMware will acquire Carbon Black in an all cash transaction for $26 per share, representing an enterprise value of $2.1 billion. Following the close of the transaction, VMware will be positioned to provide a highly differentiated, intrinsic security cloud that will better protect enterprise workloads and clients through big data, behavioral analytics and AI. Carbon Black is a leading … More →

The post VMware acquires Carbon Black appeared first on Help Net Security.

Industry News

Quantum computing: The new moonshot in the cyber space race

1 day ago

In 2016, China launched Micius, the world’s first quantum communications enabled satellite. For some, that launch eerily echoed the launch of the Soviet Union’s Sputnik satellite in 1957, which caught the United States off guard and spurred a decades-long contest to regain and maintain global technological and military supremacy. The parallel wasn’t lost on the Chinese. Jian-Wei Pan, the lead researcher on the Micius project, hailed the start of “a worldwide quantum space race.” Indeed, … More →

The post Quantum computing: The new moonshot in the cyber space race appeared first on Help Net Security.

Help Net Security

Facebook phishing surges, Microsoft still most impersonated brand

1 day ago

Vade Secure published the results of its Phishers’ Favorites report for Q2 2019. According to the report, which ranks the 25 most impersonated brands in phishing attacks, Microsoft was by far the top target for the fifth straight quarter. There was also a significant uptick in Facebook phishing, as the social media giant moved up to the third spot on the list as a result of a staggering 176 percent YoY growth in phishing URLs. … More →

The post Facebook phishing surges, Microsoft still most impersonated brand appeared first on Help Net Security.

Help Net Security

Should you block newly registered domains? Researchers say yes

1 day 1 hour ago

7 out of 10 newly registered domains (NDRs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access to them with URL filtering. “While this may be deemed a bit aggressive by some due to potential false-positives, the risk from threats via NRDs is much greater. At the bare minimum, if access to NRDs are allowed, then alerts should be set up for additional visibility,” … More →

The post Should you block newly registered domains? Researchers say yes appeared first on Help Net Security.

Zeljka Zorz

New infosec products of the week: August 23, 2019

1 day 1 hour ago

YubiKey 5Ci: First security key designed with both USB-C and Lightning connectors This unique dual-connector functionality makes the YubiKey 5Ci the perfect solution for consumers or enterprises looking for strong hardware-backed authentication across iOS, Android, MacOS, or Windows devices. The YubiKey 5Ci is available at a retail price of $70 USD. 400G Triton cyber warfare simulation tool can replicate any attack Mimicking attacks from all over the world, Triton 400 utilizes a comprehensive understanding of … More →

The post New infosec products of the week: August 23, 2019 appeared first on Help Net Security.

Mirko Zorz

New cross-industry consortium aims to accelerate confidential computing adoption

1 day 2 hours ago

The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential computing. Companies committed to this work include Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent. What is confidential computing? Across industries computing is moving to span multiple environments, from on premises to public cloud to edge. As companies move these workloads to different environments, they need protection … More →

The post New cross-industry consortium aims to accelerate confidential computing adoption appeared first on Help Net Security.

Help Net Security

AttackIQ automates the evaluation of Microsoft Defender ATP

1 day 5 hours ago

AttackIQ, a leader in the continuous security validation market to help organizations achieve cyber resiliency, announced the integration of its AttackIQ Platform with Microsoft Defender Advanced Threat Protection (ATP) to help joint customers and prospects validate the configuration and security coverage provided by the most widely deployed operating system in the world. In addition to the integration, AttackIQ is helping to validate Microsoft Defender ATP in Microsoft’s pre-sales engagements on account of AttackIQ’s differentiated open … More →

The post AttackIQ automates the evaluation of Microsoft Defender ATP appeared first on Help Net Security.

Industry News

SafeGuard Cyber can now secure conversations in WeChat

1 day 5 hours ago

SafeGuard Cyber, the leading end-to-end platform for social media and digital risk protection, announced a new capability to secure conversations in WeChat, making it one of the only entities to provide security and real-time compliance protection for businesses that use the mobile messaging application. WeChat now has more than one billion daily active users, approximately 80 percent of whom use it for business purposes. Western companies have found WeChat to be a de facto requirement … More →

The post SafeGuard Cyber can now secure conversations in WeChat appeared first on Help Net Security.

Industry News

Manage microservices-based applications with security-focused Istio and Red Hat OpenShift

1 day 6 hours ago

Red Hat announced the general availability of Red Hat OpenShift Service Mesh to connect, observe and simplify service-to-service communication of Kubernetes applications on Red Hat OpenShift 4, the industry’s most comprehensive enterprise Kubernetes platform. Based on the Istio, Kiali and Jaeger projects and enhanced with Kubernetes Operators, OpenShift Service Mesh is designed to deliver a more efficient, end-to-end developer experience around microservices-based application architectures. This helps to free developer teams from the complex tasks of … More →

The post Manage microservices-based applications with security-focused Istio and Red Hat OpenShift appeared first on Help Net Security.

Industry News

Cybersecurity salary, skills, and stress survey

1 day 19 hours ago

Exabeam is conducting an annual survey to understand skills, compensation trends and workplace trends among SOC and security analysts. All participants will receive the results of the survey. Questions include certifications, security responsibilities, compensation ranges, and perceptions around new tech like machine learning and AI. Completing the survey takes 7 minutes (less if you are a really fast reader). The results of the survey are anonymous. Prizes for participants They will randomly select 10 winners … More →

The post Cybersecurity salary, skills, and stress survey appeared first on Help Net Security.

Help Net Security

Cisco warns about public exploit code for critical flaws in its 220 Series smart switches

1 day 19 hours ago

Cisco has fixed over 30 vulnerabilities in various solutions, including Cisco UCS Director, Cisco UCS Director Express for Big Data, Cisco IMC Supervisor, and the Cisco 220 Series smart switches. Updates by product Users of Cisco UCS Director and Cisco UCS Director Express for Big Data are advised to upgrade to versions 6.7.3.0 and 3.7.3.0, respectively, as they fix, among other things: CVE-2019-1938, an API authentication bypass vulnerability that could be triggered by a specially … More →

The post Cisco warns about public exploit code for critical flaws in its 220 Series smart switches appeared first on Help Net Security.

Zeljka Zorz

400G Triton cyber warfare simulation tool can replicate any attack

1 day 20 hours ago

Telesoft Technologies — a provider of cyber security technologies for high-density cyber environments, including network, government, and large organizations — has announced the release of Triton 400, a cyber warfare simulation tool which can replicate myriad adversarial attack methods. Mimicking attacks from all over the world, Triton 400 utilises a comprehensive understanding of frontline threat intelligence from around the globe to simulate natural and malicious traffic at unprecedented speeds for such a capability. Taking a … More →

The post 400G Triton cyber warfare simulation tool can replicate any attack appeared first on Help Net Security.

Industry News

Unlocking the future of blockchain innovation with privacy-preserving technologies

2 days ago

The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision of a new financial system underscored by cryptography and trust in code. Throughout the past decade, iterations of this technological infrastructure have gradually built out a diverse industry ecosystem, allowing for use cases that extend beyond cryptocurrencies and peer-to-peer transactions. From smart contracts to asset … More →

The post Unlocking the future of blockchain innovation with privacy-preserving technologies appeared first on Help Net Security.

Help Net Security

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses

2 days 1 hour ago

The dream of an AI-influenced world is finally here. After decades of writing about it, AI has reached a point where it’s ingrained into our daily lives. From the days of SmarterChild – for many, the AIM messenger bot was the first foray into AI – to now the ubiquitous presence of the AI-enabled digital assistant such as Siri, the vision of artificial intelligence transforming
 from sci-fi to reality has come to fruition. But instead … More →

The post From SmarterChild to Siri: Why AI is the competitive advantage securing businesses appeared first on Help Net Security.

Help Net Security

Identifying vulnerable IoT devices by the companion app they use

2 days 1 hour ago

For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a slew of security vulnerabilities that could turn them into a nightmare. Until legislation catches up and manufacturers start caring about implementing security from the start, security researchers are our only hope when it comes to improving IoT security. Consequently, every approach that makes the process of identifying as … More →

The post Identifying vulnerable IoT devices by the companion app they use appeared first on Help Net Security.

Zeljka Zorz

Identifying evasive threats hiding inside the network

2 days 2 hours ago

There is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting savvier. They are better at blending in without tripping any alerts. They skip over tools and techniques that trigger standard security systems. How can a company tell them apart from the noise created by legitimate logins to the network that day? The answer lies in context. It … More →

The post Identifying evasive threats hiding inside the network appeared first on Help Net Security.

Help Net Security

Acronis True Image 2020 replicates local backups in the cloud

2 days 3 hours ago

Acronis True Image 2020 enables users to automatically replicate local backups in the cloud – making it the first personal solution to automate the 3-2-1 backup rule that data protection experts almost universally recommend. What’s more, the Dual Protection replication feature is just one of more than 100 enhancements and new capabilities incorporated into Acronis True Image 2020 that are designed to further improve its performance, control, and security. “Considering how much we rely on … More →

The post Acronis True Image 2020 replicates local backups in the cloud appeared first on Help Net Security.

Industry News

Zimperium zIPS: Machine learning-based mobile phishing detection solution

2 days 4 hours ago

Zimperium, the global leader in mobile threat defense (MTD), announced new innovative enhancements to its zIPS anti-phishing protection. zIPS is the first and only on-device, machine learning-based mobile phishing detection solution providing the flexibility to tailor protection and privacy levels by groups. zIPS anti-phishing is available for iOS and Android devices. In 2018, there were 482.5 million attempted phishing attacks, which is more than double the attacks in 2017. The 2018 Verizon Data Breach Investigations … More →

The post Zimperium zIPS: Machine learning-based mobile phishing detection solution appeared first on Help Net Security.

Industry News

InnoAGE SSD: First SSD with native Microsoft Azure Sphere integration

2 days 4 hours ago

Innodisk unveiled the InnoAGE SSD, the world’s first with native Microsoft Azure Sphere integration. It enables multifunctional management for smart data analysis and updates, data security, and remote control through the cloud. “Our tight-knit collaboration with Microsoft has resulted in real innovation aimed at solving the very real challenges businesses face today,” said Innodisk President Randy Chien. “The InnoAGE SSD is the first and only hybrid solution designed solely with the AIoT architecture in mind, … More →

The post InnoAGE SSD: First SSD with native Microsoft Azure Sphere integration appeared first on Help Net Security.

Industry News

Limelight Networks expands management capabilities of its suite of services

2 days 5 hours ago

Limelight Networks has expanded the management and configuration capabilities of its suite of services with new Application Programming Interfaces (APIs) and web portal offerings. With these new capabilities in addition to existing APIs and Software Development Kits, developers now have more power to manage and monitor services across Limelight’s edge cloud platform. According to an IDC survey, more than half the organizations surveyed have already adopted DevOps practices, with an additional 20 percent planning to … More →

The post Limelight Networks expands management capabilities of its suite of services appeared first on Help Net Security.

Industry News

Cryptography

Freelancing

Tasker: Total Automation for Android