Information Security Wire

Woodstock Wire: Information Security Wire

CyberArk Announces Strong Third Quarter 2018 Results

Business Wire - CyberArk (NASDAQ: CYBR), the global leader in privileged access security, today announced record total revenue and strong financial results for...
Sun, 11 Nov 2018 22:40:53 - #cyberark #security

Global Survey from Ping Identity Shows Consumers Are Abandoning Brands After Data Breaches

Business Wire - Ping Identity, the leader in Identity Defined Security, today released results of the Ping Identity 2018 Consumer Survey: Attitudes and Behavior...
Sun, 11 Nov 2018 22:40:49 - #cybersecurity #pingidentity #security

McAfee Honors 24 Partners with Awards for Excellence in Security

Business Wire - Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished Partner Awards. The awards ceremony, hosted...
Sun, 11 Nov 2018 22:40:39 - #cybersecurity #security

Symantec Acquires Appthority to Enhance Protection From Mobile Application Vulnerabilities

Business Wire - Symantec Acquires Appthority to Enhance Protection From Mobile Application Vulnerabilities
Sun, 11 Nov 2018 22:40:37 - #acquisition #security

Symantec Acquires Javelin Networks to Thwart Growing Number of Active Directory-Based Attacks

Business Wire - Symantec Acquires Javelin Networks to Thwart
Growing Number of Active Directory-Based Attacks
Sun, 11 Nov 2018 22:40:36 - #acquisition #security

Predictions 2019: Cybersecurity Faces Old Familiar Foes, Costly New Attacks, And Welcome Leadership Changes

Think - Forrester Blogs - Next year, the biggest challenges to the cybersecurity industry will come from outside forces. In 2019, geopolitical trends...
Sun, 11 Nov 2018 22:14:18 - #cybersecurity #security

Forrester Cyber Predictions 2019: European Take

Think - Forrester Blogs - Today my team published Forrester's Predictions for the cybersecurity industry for 2019. We listed 5 key trends that we think...
Sun, 11 Nov 2018 22:14:17 - #cybersecurity #security

Linux Cryptocurrency miner leverages rootkit to avoid detection

Infosec - Security Affairs - Researchers from Trend Micro spotted a new cryptocurrency miner that leverages a rootkit component to hide its presence on...
Sun, 11 Nov 2018 21:37:54 - #cybersecurity #security

VPN vs. proxy: which is better to stay anonymous online?

Infosec - Security Affairs - Most people prefer using proxies over VPN services because they are easy to use and mostly available for free, but can it...
Sun, 11 Nov 2018 21:37:53 - #cybersecurity #security

Nginx server security flaws expose more than a million of servers to DoS attacks

Infosec - Security Affairs - Nginx developers released security updates to address several denial-of-service (DoS) vulnerabilities affecting the nginx...
Sun, 11 Nov 2018 21:37:52 - #nginx #security

8 features a cybersecurity technology platform must have

Infosec - CSO Online - In a blog post I wrote in August - The most important attributes of a cybersecurity platform - I listed the eight attributes that...
Sun, 11 Nov 2018 21:37:51 - #cybersecurity #security

VMware releases security patches for a critical virtual machine escape flaw

Infosec - Security Affairs - VMware released security patches for a critical virtual machine (VM) escape vulnerability that was recently discovered at...
Sun, 11 Nov 2018 21:37:50 - #vmware #security

Embracing the Cybersecurity 'Grey Space'

Infosec - Threatpost - Security teams carefully monitor potential threat activity, but incidents aren't always black and white.
Sun, 11 Nov 2018 21:37:49 - #cybersecurity #security

Advanced tools: Process Hacker

Infosec - Malwarebytes Unpacked - Process Hacker is a very valuable tool for advanced users. It can help them to troubleshoot problems or learn more about...
Sun, 11 Nov 2018 21:37:48 - #security

Cloud Computing without Containers

Infosec - Cloudflare - Cloudflare has a cloud computing platform called Workers. Unlike essentially every other cloud computing platform I know of, it...
Sun, 11 Nov 2018 21:37:47 - #datacenter #kubernetes #cloud #aws #security

FACT OR FICTION: SSO is the same as a Password Manager

Infosec - Okta Blog - At Okta, we are highly invested in the latest ideas and practices around authentication and security-and that requires some myth...
Sun, 11 Nov 2018 21:37:46 - #phishing #security

Forrester recognizes Okta as a Strong Performer in Zero Trust security

Infosec - Okta Blog - Today, analyst firm Forrester published inaugural research naming Okta a Strong Performer in the Zero Trust security market. The...
Sun, 11 Nov 2018 21:37:45 - #security

Microsoft President: Governments Must Cooperate on Cybersecurity

Infosec - Dark Reading - Microsoft's Brad Smith calls on nations and businesses to work toward "digital peace" and acknowledge the effects of cybercrime.
Sun, 11 Nov 2018 21:37:44 - #microsoft #cybersecurity #security

Why NIST is so popular in Japan

Infosec - CyberScoop - While all organizations around the globe continue to grapple with chronic shortages of qualified cybersecurity workers, Japan is...
Sun, 11 Nov 2018 21:37:43 - #cybersecurity #security

Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide

Infosec - Security Affairs - Security researchers revealed in a recent paper that over the past years, China Telecom used BGP hijacking to misdirect Internet...
Sun, 11 Nov 2018 21:37:42 - #microsoft #verizon #security

U.S. Secret Service Warns ID Thieves are Abusing USPS's Mail Scanning Service

Infosec - Krebs on Security - A year ago, KrebsOnSecurity warned that "Informed Delivery," a new offering from the U.S. Postal Service (USPS) that lets...
Sun, 11 Nov 2018 19:53:41 - #security

U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program

Infosec - Security Affairs - The United States Air Force announced earlier this week that it has launched the third bug bounty program called Hack the...
Sun, 11 Nov 2018 19:53:40 - #security

Principles for Corporate Platforms in the Gig Economy

Infosec - EFF Deeplinks - From ride-hailing platforms like Lyft and Uber, to sites like Airbnb, FlipKey, or VRBO that enable occupants to rent properties,...
Sun, 11 Nov 2018 19:53:39 - #cybersecurity #security

5 Reasons Why Threat Intelligence Doesn't Work

Infosec - Dark Reading - Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.
Sun, 11 Nov 2018 19:53:38 - #cybersecurity #threatintelligence #security

Apache Struts users have to update FileUpload library to fix years-old flaws

Infosec - Security Affairs - Apache Struts Users have to update the Commons FileUpload library in Struts 2 that is affected by two vulnerabilities.
Sun, 11 Nov 2018 19:53:35 - #security

Busting SIM Swappers and SIM Swap Myths

Infosec - Krebs on Security - KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and...
Sun, 11 Nov 2018 19:53:34 - #cybersecurity #phishing #blockchain #security

Compromising vital infrastructure: transport and logistics

Infosec - Malwarebytes Unpacked - Back when I was a dispatcher for a courier and trucking company, we used to joke that it only took a few strategically-placed...
Sun, 11 Nov 2018 19:53:33 - #cybersecurity #phishing #security

Worst malware and threat actors of 2018 so far

Infosec - CSO Online - What's the worst malware so far into 2018? The worst botnets and banking trojans, according to Webroot, were Emotet, Trickbot, and...
Sun, 11 Nov 2018 19:53:32 - #microsoft #cybersecurity #botnet #security

IBM Watson will be used by NIST to assign CVSS scores to vulnerabilities

Infosec - Security Affairs - The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores...
Sun, 11 Nov 2018 19:53:29 - #ibm #ai #cybersecurity #security

Shellbot Botnet Targets IoT devices and Linux servers

Infosec - Security Affairs - Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot.
The malware was...
Sun, 11 Nov 2018 19:53:28 - #ibm #ubuntu #android #ddos #iot #cybersecurity #botnet #security

PortSmash Side-Channel Attack Siphons Data From Intel, Other CPUs

Infosec - Threatpost - An exploit was released for a flaw existing in a process in CPUs called Simultaneous Multithreading (SMT).
Sun, 11 Nov 2018 19:40:23 - #security

Chrome 70 Update: HTTPS Site Security and the Full Symantec Distrust

Web Marketing - Portent Blog - As of October 17, 2018, Google has released Chrome 70, and with it, they have once again increased their security warnings for...
Sun, 11 Nov 2018 19:13:16 - #security

Zero-day in popular WordPress plugin exploited in the wild to take over sites

Enterprise - ZDNet News - Attacks started around three weeks ago and are still going on. Users should update the WP GDPR Compliance plugin to version 1.4.3...
Sun, 11 Nov 2018 02:13:42 - #wordpress #gdpr #security

A simpler way to assess the network exposure of EC2 instances: AWS releases new network reachability assessments in Amazon Inspector

Enterprise - Amazon AWS Blog - Performing network security assessments allows you to understand your cloud infrastructure and identify risks, but this process...
Sun, 11 Nov 2018 02:13:35 - #cybersecurity #firewall #cloud #aws #ai #security

Threat Stack acquires Bluefyre in cloud infrastructure security push

Enterprise - ZDNet News - The company will use Bluefyre's portfolio to assist developers in building secure cloud-native applications.
Sun, 11 Nov 2018 02:13:33 - #acquisition #security

Bruce Schneier: You want real IoT security? Have Uncle Sam start putting boots to asses

Enterprise - The Register - Infosec's cool uncle says to hell with the carrot
Any sort of lasting security standard in IoT devices may only happen if governments...
Sun, 11 Nov 2018 02:13:31 - #iot #security

Hunt for U.S. cyber security pros intensifies

Enterprise - Channelnomics - Efforts to address shortage of cyber security workers underway with 'frustratingly slow' progress - report
Sun, 11 Nov 2018 02:13:29 - #cybersecurity #security

Leverage Azure Security Center to detect when compromised Linux machines attack

Enterprise - Microsoft Azure - When an attacker compromises a machine, they typically have a goal in mind. Some attackers are looking for information residing...
Sun, 11 Nov 2018 01:13:08 - #microsoft #cybersecurity #cloud #azure #threatintelligence #security

At China's Internet Conference, a Darker Side of Tech Emerges

Tech - NY Times Technology - The World Internet Conference in Wuzhen, China, has long showcased flashy new tech. This year, discussions also dealt with...
Sat, 10 Nov 2018 22:13:16 - #cybersecurity #security

Thieves are using 'informed delivery' to spy on mail and commit fraud

Tech - Mashable - Welp, another day and another way for thieves to violate your privacy and commit credit card fraud.
Scammers have figured out how...
Sat, 10 Nov 2018 22:13:15 - #cybersecurity #security

ForeScout Acquires SecurityMatters

Globe Newswire - ForeScout Technologies, Inc. (NASDAQ:FSCT), a leading Internet of Things (IoT) security company, today announced it has acquired SecurityMatters,...
Fri, 09 Nov 2018 13:13:03 - #iot #acquisition #security

Over 50 Fortinet Security Fabric Solutions Earn the U.S. Department of Defense's Endorsement for Its Approved Product List Certification

Globe Newswire - Bob Fortna, President of Fortinet Federal Inc."Achieving DoDIN APL certification for additional solutions within the Fortinet Security Fabric...
Fri, 09 Nov 2018 12:37:24 - #cybersecurity #security

Row-Level Security is now supported for Microsoft Azure SQL Data Warehouse

Enterprise - Microsoft Azure - Today we're announcing the general availability of Row-Level Security (RLS) for Microsoft Azure SQL Data Warehouse, an additional...
Thu, 08 Nov 2018 15:13:05 - #microsoft #cloud #azure #gdpr #security

Silent No More: Mobile Roamers Spur a Security Evolution

Enterprise - Palo Alto Networks Blog - Were you a "silent roamer"?
If you used to travel internationally, turned off your cellular radio while searching desperately...
Thu, 08 Nov 2018 14:54:22 - #iot #paloaltonetworks #cybersecurity #botnet #security

Five cyber security trends to prepare for: Gartner

Enterprise - IT World Canada - Business leaders are finally getting the importance cyber security, but infosec pros still have work to do.
Thu, 08 Nov 2018 14:13:44 - #cybersecurity #security

Tech Docs: GlobalProtect Cloud Service Updates Added to Getting Started Guide

Enterprise - Palo Alto Networks Blog - In response to your documentation requests, we've added more information to the GlobalProtect Cloud Service Getting...
Thu, 08 Nov 2018 14:13:39 - #paloaltonetworks #security

Zscaler to Host First Quarter Fiscal 2019 Earnings Conference Call

Globe Newswire - Technology - Earnings Results to be released on Tuesday, December 4, 2018, After the Close of the Market
Thu, 08 Nov 2018 14:13:26 - #zscaler #security

Proofpoint Signs New Corporate Headquarters Lease in Sunnyvale, California

Globe Newswire - Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced it has signed an 11-year corporate headquarters...
Wed, 07 Nov 2018 16:13:08 - #cybersecurity #proofpoint #security

Gartner names Bitglass a leader in cloud security

Enterprise - ChannelLife New Zealand - Bitglass was evaluated based on its ability to execute and its completeness of vision.
Wed, 07 Nov 2018 13:38:37 - #security

Symantec picks up cybersecurity startups Appthority and Javelin to bolster portfolio

Enterprise - SiliconANGLE - Symantec Corp. recently revealed plans to trim its workforce by eight percent as part of a cost-cutting initiative, but the company...
Wed, 07 Nov 2018 13:13:27 - #cybersecurity #security