(IN)SECURE Magazine Notifications RSS

Fortinet unveiled the FortiGate 4400F, a firewall capable of securing 5G networks

5 days 5 hours ago

Fortinet announced the FortiGate 4400F, a hyperscale firewall, setting new milestones for Security Compute Ratings to deliver performance, scalability and security in a single appliance to meet escalating business needs. FortiGate 4400F is powered by Fortinet’s latest seventh generation network processor (NP7) to offer hardware-acceleration, making it the only network firewall that is fast enough to secure hyperscale data centers and 5G networks. Today’s most digitally innovative organizations face escalating and often unpredictable capacity needs … More →

The post Fortinet unveiled the FortiGate 4400F, a firewall capable of securing 5G networks appeared first on Help Net Security.

Industry News

Windstream Enterprise fortifies SD-WAN with virtual NGFW

5 days 6 hours ago

Windstream Enterprise released a new security feature to protect businesses from increasingly sophisticated threats to their network and their data. Offered as part of its managed SD-WAN service, Windstream Enterprise’s new Virtual Network Function (VNF) Next-Generation Firewall (NGFW) gives businesses peace of mind that their networks are safe from attacks, out to the network edge, while also reducing the complexity associated with implementing a large-scale network security solution. The VNF Firewall service expands upon Windstream … More →

The post Windstream Enterprise fortifies SD-WAN with virtual NGFW appeared first on Help Net Security.

Industry News

Push Technology releases Diffusion Kafka Adapter

5 days 6 hours ago

Push Technology launched a new Kafka Adapter for their Diffusion Intelligent Data Mesh. With the Diffusion Kafka Adapter, organizations can now securely extend Kafka solutions over the Internet, streaming real-time data to millions of end-user applications. In addition, customers can easily manage the high-volume of data across geographically dispersed regions. Kafka has proven capability for high-throughput data handling within the data center. When dealing with potentially hundreds of thousands of topics and concurrent connections in … More →

The post Push Technology releases Diffusion Kafka Adapter appeared first on Help Net Security.

Industry News

SimIQ: Efficient GNSS testing during product development

5 days 7 hours ago

Spirent Communications released SimIQ. From software-in-the-loop through to final form testing, SimIQ enables developers to collaborate across the full design lifecycle through the creation, sharing and replay of I/Q data files. SimIQ has been developed to meet the growing need to test GNSS capabilities earlier to accelerate product development, while simultaneously reducing costs by identifying issues prior to the purchase of hardware components. For developers using Spirent’s market-leading GSS7000 and GSS9000 simulators, SimIQ extends multi-frequency, … More →

The post SimIQ: Efficient GNSS testing during product development appeared first on Help Net Security.

Industry News

HPE and SAP partner to deliver SAP HANA Enterprise Cloud with HPE GreenLake

5 days 7 hours ago

HPE announced plans to partner with SAP to deliver the customer edition of SAP HANA Enterprise Cloud with HPE GreenLake, as a fully managed service at the edge, in the customer’s data center or colocation facility of their choice. Customers will be able to keep their SAP software landscape and data on-premises while gaining the benefits of a subscription-based, agile, elastic, and consistent cloud experience from SAP with HPE GreenLake. The new offering SAP HANA … More →

The post HPE and SAP partner to deliver SAP HANA Enterprise Cloud with HPE GreenLake appeared first on Help Net Security.

Industry News

Balbix BreachControl added to Ingram Micro Cloud Marketplace

5 days 8 hours ago

Balbix announced a global cloud distribution agreement with Ingram Micro that brings its award-winning Balbix BreachControl solution to the Ingram Micro Cloud Marketplace, a marketplace of cloud solutions and services for the channel. This solution enables CISOs to gain real-time visibility into their breach risk and reduce cyber-risk by 95% or more, while making security teams 10x more efficient. “Pandemic-induced shifts in work patterns over the past few months have brought about an unprecedented expansion … More →

The post Balbix BreachControl added to Ingram Micro Cloud Marketplace appeared first on Help Net Security.

Industry News

State Department offers $10 million for info on hackers targeting U.S. elections

5 days 17 hours ago

As the day of the U.S. presidential elections is quickly approaching, election security is again becoming a topic of more and more security discussions. Are the polling booth systems secure? Could attackers interfere with them? What about voting by mail? Is it a secure option? Will the United States Postal Service (USPS) be able to handle a greater than usual (due to COVID-19) influx of mailed ballots? The security of electronic voting Prior to the … More →

The post State Department offers $10 million for info on hackers targeting U.S. elections appeared first on Help Net Security.

Zeljka Zorz

TeamViewer flaw could be exploited to crack users’ password

5 days 20 hours ago

A high-risk vulnerability (CVE-2020-13699) in TeamViewer for Windows could be exploited by remote attackers to crack users’ password and, consequently, lead to further system exploitation. About TeamViewer TeamViewer is an application developed by German company TeamViewer GmbH and is available for Windows, macOS, Linux, Chrome OS, iOS, Android, Windows RT Windows Phone 8 and BlackBerry operating systems. It is used primarily for remote access to and control of various types of computer systems and mobile … More →

The post TeamViewer flaw could be exploited to crack users’ password appeared first on Help Net Security.

Zeljka Zorz

How can security leaders maximize security budgets during a time of budget cuts?

6 days 1 hour ago

It’s no secret that the current pandemic is causing a major strain on consumers and businesses alike. As the U.S. teeters on the verge of a recession, companies are cutting their spending wherever they can — including in cybersecurity. Gartner estimates that security faces cuts as high as $6.7 billion — an unfortunate outcome, particularly since most organizations are also experiencing an expansion of their attack surface as a result of more people working from … More →

The post How can security leaders maximize security budgets during a time of budget cuts? appeared first on Help Net Security.

Help Net Security

Misconfigured cloud storage services are commonplace in 93% of deployments

6 days 2 hours ago

Cloud breaches will likely increase in velocity and scale, and highlights steps that can be taken to mitigate them, according to Accurics. “While the adoption of cloud native infrastructure such as containers, serverless, and servicemesh is fueling innovation, misconfigurations are becoming commonplace and creating serious risk exposure for organizations,” said Om Moolchandani, CTO, Accurics. “As cloud infrastructure becomes increasingly programmable, we believe that the most effective defense is to codify security into development pipelines and … More →

The post Misconfigured cloud storage services are commonplace in 93% of deployments appeared first on Help Net Security.

Help Net Security

25% of IT workers don’t enforce security policies

6 days 2 hours ago

14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a significant productivity bog for IT and employees alike, with 57% of IT workers resetting employee passwords up to five times per week, and 15% doing so at least 21 times per week. Shadow IT issues IAM is often used to detect shadow IT, and … More →

The post 25% of IT workers don’t enforce security policies appeared first on Help Net Security.

Help Net Security

Malware attacks abusing machine identities grew 8x over the last 10 years

6 days 3 hours ago

Commodity malware campaigns utilizing machine identities are increasing rapidly, according to threat analysis from Venafi. For example, malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink. Researchers gathered data on the misuse of machine identities by analyzing security incidents and third-party reports in the public domain. Overall, malware attacks utilizing machine identities grew eightfold over the last 10 years and increased more rapidly in … More →

The post Malware attacks abusing machine identities grew 8x over the last 10 years appeared first on Help Net Security.

Help Net Security

Cybercriminals are developing and boosting their attacks

6 days 3 hours ago

An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure. With organizations and businesses rapidly deploying remote systems and networks to support staff working from home, criminals are also taking advantage of increased security vulnerabilities to steal data, generate profits and cause disruption. In one four-month period (January to April) some 907,000 spam messages, 737 incidents related … More →

The post Cybercriminals are developing and boosting their attacks appeared first on Help Net Security.

Help Net Security

Discounted CISSP exam prep pricing is back

6 days 4 hours ago

Challenging times call for exceptional measures, and (ISC)² is committed to helping you keep your CISSP certification goals on track this year. (ISC)² is bringing back special pricing on flexible CISSP exam prep so you can keep moving forward with full freedom and confidence. For a limited time, take advantage of Official CISSP Online Self-Paced Training at a discounted price of just $561 – normally $849. Now’s the time to advance your career with the … More →

The post Discounted CISSP exam prep pricing is back appeared first on Help Net Security.

Help Net Security

SAFE Phish: Phish testing and training redefined

6 days 4 hours ago

Mimecast announced an industry changing capability that will allow customers to launch live phishing simulations. Known as SAFE Phish, it’s designed to let security teams create training exercises using real-life, de-weaponized campaigns that target their organizations and employees. Training results are engineered to be incorporated into the Mimecast SAFE Score dashboard, which is designed to aggregate data to gauge a company’s security posture. Organizations have an opportunity to re-define the way overall risk is measured … More →

The post SAFE Phish: Phish testing and training redefined appeared first on Help Net Security.

Industry News

Verimatrix unveils anti-tamper tech to protect Bitcode-enabled iOS apps

6 days 5 hours ago

Verimatrix announced new protection for Bitcode-enabled iOS applications. Publishing an app to Apple’s App Store with Bitcode enabled allows Apple to optimize the app’s code for each target device. Developers are now able to provide anti-tamper protections for the fast-growing Bitcode iOS market. Through a new, Elastic Anti-Tamper feature, Verimatrix’s family of award-winning Application Shielding solutions now feature powerful technology that compares application actions to that of when it was first launched by the user. … More →

The post Verimatrix unveils anti-tamper tech to protect Bitcode-enabled iOS apps appeared first on Help Net Security.

Industry News

Intel and VMware extend virtualization to RAN through broadened collaboration for 5G

6 days 7 hours ago

Intel and VMware are collaborating on an integrated software platform for virtualized Radio Access Networks (RAN) to accelerate the rollout of both existing LTE and future 5G networks. As communications service providers (CoSPs) evolve their networks to support the rollout of future 5G networks, they are increasingly adopting a software-defined, virtualized infrastructure. Virtualization of the core network has already enabled CoSPs to improve operational costs and bring services to market faster. This expanded collaboration between … More →

The post Intel and VMware extend virtualization to RAN through broadened collaboration for 5G appeared first on Help Net Security.

Industry News

Microchip releases Flashtec NVMe 3108 PCIe Gen 4 enterprise NVMe SSD controller

6 days 7 hours ago

As data centers support more Artificial Intelligence (AI) and Machine Learning (ML) workloads, there is a need for cloud scale infrastructure that provides more bandwidth to storage and more storage density per rack. The trend is therefore to adopt PCIe Gen 4-capable NVM Express (NVMe) Solid State Drives (SSDs) in smaller form factors such as M.2 and the newer SNIA Enterprise and Data Center SSD Form Factor (EDSFF) E1.S form factors. These SSDs require controllers … More →

The post Microchip releases Flashtec NVMe 3108 PCIe Gen 4 enterprise NVMe SSD controller appeared first on Help Net Security.

Industry News

Patrick Harr becomes CEO of SlashNext

6 days 8 hours ago

SlashNext announced that security and cloud services veteran Patrick Harr has joined the company as CEO. With a proven track record of leading security and cloud startups, as well as Fortune 100 divisions, Harr will drive the company’s next phase of growth and accelerate its mission to protect the world’s internet users from all forms of phishing across email, mobile, web, SMS, social networking, gaming and collaboration services. “Appointing Patrick to our executive leadership team … More →

The post Patrick Harr becomes CEO of SlashNext appeared first on Help Net Security.

Industry News

Firefox to block redirect tracking

6 days 20 hours ago

Mozilla has announced a new Firefox protection feature to stymie a new user tracking technique lately employed by online advertisers: redirect tracking. How does redirect tracking work? Online advertisers, web analytics companies and browser makers are locked in a perennial arms race when it comes to methods for tracking users’ online behavior. By implementing anti-fingerprinting protections, an anti tracking policy, Enhanced Tracking Protection (ETP) blocking trackers, cross-site and third-party tracking cookies, Mozilla has, slowly but … More →

The post Firefox to block redirect tracking appeared first on Help Net Security.

Zeljka Zorz