Information Security Wire

Woodstock Wire: Information Security Wire

Annual SonicWall Cyber Threat Report Details Rise in Worldwide, Targeted Attacks

Business Wire - 2018 threat data indicates an escalation in the volume of cyberattacks and new, targeted threat tactics used by criminals.
Tue, 26 Mar 2019 14:30:57 - #cybersecurity #security

Code42's Data Security 'Red Team' Experts to Discuss Best Practices for Proactive Cyberthreat Protection During Live Webinar

Business Wire - Code42, the leader in next-gen data loss...
Tue, 26 Mar 2019 14:30:55 - #code42 #cybersecurity #security

CyberArk Named an Overall Privileged Access Management Leader by KuppingerCole Analysts

Business Wire - CyberArk (NASDAQ: CYBR) today announced...
Tue, 26 Mar 2019 14:30:54 - #cyberark #security

How can you harden your human firewall? Use these creative and meaningful tactics in your awareness program

Think - Forrester Blogs - We consistently get inquiries with clients asking us about the trends and effective ways to create cyber security awareness...
Tue, 26 Mar 2019 14:13:54 - #cybersecurity #security

Tech companies must anticipate the looming risks as AI gets creative

Think - MIT Technology Review - Governments will need to enact stricter regulations as well, says one Microsoft AI expert.
Tue, 26 Mar 2019 14:13:53 - #microsoft #ai #security

How to report a data breach under GDPR

Infosec - CSO Online - The General Data Protection Regulation (GDPR) is a broad set of regulations that dictate how a company handles the personal data...
Tue, 26 Mar 2019 14:13:43 - #cybersecurity #gdpr #security

Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist

Infosec - Dark Reading - In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.
Tue, 26 Mar 2019 14:13:40 - #cybersecurity #security

Is it time to reform the Computer Misuse Act?

Infosec - The Daily Swig - Police in the UK lack the tools to prosecute cybercriminals
Tue, 26 Mar 2019 14:13:39 - #cybersecurity #security

Collective Intelligence Podcast, Kris Mansson of Silobreaker

Infosec - Flashpoint - When the enterprise considers what threat intelligence is all about, it thinks in terms of technical, structured information:...
Tue, 26 Mar 2019 14:13:38 - #cybersecurity #threatintelligence #security

How to hack your own Wi-Fi network

Enterprise - Network World News - One way to bolster your understanding of Wi-Fi security is to do some hacking yourself. That doesn't mean you should infiltrate...
Tue, 26 Mar 2019 13:42:17 - #security

At the RSA Conference: Oh, That Security Talent Crunch?

Enterprise - Information Week - Keeping pace with the changes in IT security calls for new tactics in developing and acquiring security talent.
Tue, 26 Mar 2019 13:13:27 - #security

Amazon Fire HD 10 (2017) hack: bootloader unlock, root, and recovery tools

Tech - Liliputing - It's been a busy few months for Amazon Fire tablet hackers. After discovering a vulnerability affecting a group of MediaTek processors,...
Tue, 26 Mar 2019 12:13:25 - #mediatek #security

Hackers dropped a secret backdoor in Asus' update software

Tech - TechCrunch - Hackers targeted and compromised "hundreds of thousands" of Asus computer owners by pushing a backdoored update software tool from...
Tue, 26 Mar 2019 12:13:20 - #supplychain #cybersecurity #security

6 secrets to CISO job longevity

Infosec - CSO Online - Chief information security officers and other enterprise security leaders often don't remain long enough with the same organization...
Mon, 25 Mar 2019 12:43:56 - #security

Security Requires Immutability: Avoid Dynamic Environments with Change Management

Infosec - TripWire - The State of Security - When Shelley published his famous poem in 1816, he was telling us that the only constant in life is change....
Mon, 25 Mar 2019 12:13:22 - #tripwire #security

How to change the ssh port on Linux or Unix server

nixCraft - {Updated} New user guide. Learn how to change the SSH port on Linux and Unix including SELinux and firewall config options
Sun, 24 Mar 2019 23:43:04 - #firewall #security

Leaked Microsoft Edge browser confirms new features

Tech - Mashable - Microsoft's Edge browser is coming out soon with a Google Chromium-powered revamp and an online leak showed all the features.
The...
Sun, 24 Mar 2019 20:42:44 - #microsoft #cybersecurity #security

CyberArk Named a March 2019 Gartner Peer Insights Customers' Choice for Privileged Access Management

Business Wire - CyberArk (NASDAQ: CYBR) announced it was recognized as a March 2019 Gartner Peer Insights Customers' Choice for Privileged Access Management.
Sun, 24 Mar 2019 20:42:36 - #cyberark #security

LogRhythm Recognized for Market-Leading SIEM and UEBA Solutions with Multiple Award Wins

Business Wire - LogRhythm won three awards this month for its NextGen SIEM Platform and User and Entity Behavior Analytics (UEBA) solution.
Sun, 24 Mar 2019 20:42:35 - #cybersecurity #security

Okta Closes Acquisition of Azuqua

Business Wire - Okta, Inc. (NASDAQ:OKTA), the leading independent provider of identity for the enterprise, today announced that it has closed the acquisition...
Sun, 24 Mar 2019 20:42:33 - #acquisition #security

Ping Identity's API Cybersecurity Solution Wins Two More Industry Awards

Business Wire - Ping Identity, the leader in Identity Defined Security, today announced that it has received the DeveloperWeek 2019 Devies Award and the Info...
Sun, 24 Mar 2019 20:13:26 - #cybersecurity #security

Psychoanalyzing Security Cloud Fears

Think - Gartner Blog Network - Here is a funny one: why so many security professionals (and leaders) still hate the cloud?OK, OK, I get it, many of you...
Sun, 24 Mar 2019 19:41:24 - #security

How Threat Intelligence Helps Determine File Reputation

Infosec - Recorded Future - Should you open that attachment? Determining whether a file is safe to open, or whether it comes from a reputable source, is...
Sun, 24 Mar 2019 19:13:46 - #cybersecurity #threatintelligence #security

Tripwire Patch Madness: The Challenge

Infosec - TripWire - The State of Security - Welcome to Tripwire Patch Madness! Comprised of 26 vulnerabilities divided into two conferences and four divisions,...
Sun, 24 Mar 2019 19:13:45 - #tripwire #security

Security flaw in Medtronic heart defibrillators is serious, DHS says, but don't panic

Infosec - CyberScoop - The Department of Homeland Security has issued an advisory warning that a vulnerability in Medtronic heart defibrillators could...
Sun, 24 Mar 2019 19:13:43 - #cybersecurity #security

Carbonite's Webroot Acquisition: 'Do No MSP Harm'

Enterprise - ChannelE2E - Carbonite's Webroot acquisition nears finalization. Webroot MSPs should expect a 'Do No Harm' partner strategy from Carbonite CEO...
Sun, 24 Mar 2019 19:13:40 - #acquisition #security

Automation and the cybersecurity skills gap: pitfalls and solutions

Enterprise - SiliconANGLE - With a huge shortage in cybersecurity staff and automation alone unable to fill the gap, security operations centers need a new...
Sun, 24 Mar 2019 19:13:38 - #cybersecurity #security

AWS Security Profiles: Nathan Case, Senior Security Specialist, Solutions Architect

Enterprise - Amazon AWS Blog - Leading up to the AWS Santa Clara Summit, we're sharing our conversation with Nathan Case, who will be presenting at the...
Sun, 24 Mar 2019 19:13:37 - #datacenter #cloud #aws #security

Whip your information security into shape with ISO 27001

Infosec - CSO Online - Every company has sensitive data that needs to be protected. Securing information properly is a challenge that requires careful...
Fri, 22 Mar 2019 15:05:25 - #cybersecurity #security

Use Threat Intelligence to Reduce Third-Party Risk, Says Analytics Expert Thomas H. Davenport

Infosec - Recorded Future - Everything is connected to everything else.
In the internet era, this is no longer just a New Age adage - it's the bare truth...
Fri, 22 Mar 2019 15:05:24 - #cybersecurity #ai #machinelearning #threatintelligence #security

Hackers Take Down Safari, VMware and Oracle at Pwn2Own

Infosec - Threatpost - On the first day of Pwn2Own 2019 hackers poked holes in Apple Safari, VMware Workstation and Oracle VirtualBox.
Fri, 22 Mar 2019 14:42:28 - #oracle #vmware #security

Are hackers gonna hack anymore? Not if we keep reusing passwords

Infosec - Malwarebytes Unpacked - Enterprises have a password problem, and it's one that is making the work of hackers a lot easier. From credential stuffing...
Fri, 22 Mar 2019 14:42:27 - #cybersecurity #proofpoint #security

7 Cloud Service Evaluation Criteria to Help You Choose the Right Cloud Service Provider

Infosec - Threat Stack - The lack of a common framework for assessing Cloud Service Providers (CSPs) combined with the fact that no two CSPs are the same...
Fri, 22 Mar 2019 14:42:25 - #microsoft #cloud #aws #azure #googlecloud #security

Cryptocurrency Risks to Consider: From Cryptomining to Money Laundering

Infosec - Flashpoint - By Mike Mimoso - In the not-so-distant past, cybercriminal use of cryptocurrency was largely limited to using Bitcoin or Monero as...
Fri, 22 Mar 2019 14:42:24 - #cybersecurity #security

3 Ways Threat Intelligence Strengthens the American Intelligence Community

Infosec - Recorded Future - The National Intelligence Strategy of the United States, most recently updated in 2019, provides a framework for intelligence...
Fri, 22 Mar 2019 14:42:21 - #cybersecurity #threatintelligence #security

Email is the #1 target for hackers. Here's how to secure your business

Infosec - ProtonMail - Criminals love to attack businesses via email because it gives them direct access to every organization's weakest link: employees...
Fri, 22 Mar 2019 14:42:20 - #cybersecurity #proofpoint #phishing #gdpr #security

Consumers May Lose Sleep Over These Two New Magecart Breaches

Infosec - RiskIQ - We've now seen Magecart conduct numerous high-profile digital credit card-skimming attacks against major international companies to...
Fri, 22 Mar 2019 14:42:19 - #riskiq #security

Is the Private or Public Cloud Right for Your Business?

Infosec - TripWire - The State of Security - It wasn't a very long time ago when cloud computing was a niche field that only the most advanced organizations...
Fri, 22 Mar 2019 14:42:18 - #tripwire #security

How to audit Windows Task Scheduler for cyber-attack activity

Infosec - CSO Online - Recently Google announced two zero-days that impacted both the Chrome browser and Windows 7 operating system. Google released an...
Fri, 22 Mar 2019 14:42:17 - #microsoft #security

Google white hat hacker found new bug class in Windows

Infosec - Security Affairs - James Forshaw, a white hat hacker at Google Project Zero, has discovered a new class of bugs that affect Windows and some...
Fri, 22 Mar 2019 14:42:16 - #microsoft #security

PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws

Infosec - The Hacker News - The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity...
Fri, 22 Mar 2019 14:42:15 - #security

The Document that Microsoft Eluded AppLocker and AMSI

Infosec - Security Affairs - Experts analyzed an Office document containing a payload that is able to bypass Microsoft AppLocker and Anti-Malware Scan...
Fri, 22 Mar 2019 14:42:14 - #microsoft #cybersecurity #security

Microsoft Office Dominates Most Exploited List

Infosec - Dark Reading - Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.
Fri, 22 Mar 2019 14:42:13 - #microsoft #android #cybersecurity #security

DDoS Attack Size Drops 85% in Q4 2018

Infosec - Dark Reading - The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.
Fri, 22 Mar 2019 14:42:12 - #ddos #security

Google's New Cloud Security Services for Better Threat Detection and Protection in Enterprises

Enterprise - InfoQ - Google announced three new services for better threat detection and protection in enterprises: Web Risk API, Cloud Armor, and Cloud...
Fri, 22 Mar 2019 14:13:10 - #googlecloud #security

Cisco directs high priority patches for IP phone security exposures

Enterprise - Network World News - Cisco this week advised customers using its 7800 and 8800 series IP phones they should patch a variety of high-priority...
Fri, 22 Mar 2019 13:41:20 - #cisco #ddos #iot #security

A cybersecurity strategy to thwart advanced attackers

Enterprise - Amazon AWS Blog - Today, many Chief Information Security Officers and cybersecurity practitioners are looking for an effective cybersecurity...
Fri, 22 Mar 2019 13:41:19 - #cybersecurity #cloud #aws #security

Cyberattacks: Europe gets ready to face crippling online assaults

Enterprise - ZDNet News - Massive cyberattacks with real-world consequences are no longer unthinkable. Time to get prepared, says Europe.
Fri, 22 Mar 2019 13:41:18 - #cybersecurity #security

Facebook admits it stored 'hundreds of millions' of account passwords in plaintext

Tech - TechCrunch - Flip the "days since last Facebook security incident" back to zero.
Facebook confirmed Thursday in a blog post, prompted by a report...
Fri, 22 Mar 2019 11:41:16 - #cybersecurity #security

6 Ways Mature DevOps Teams Are Killing It in Security

Infosec - Dark Reading - New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
Thu, 21 Mar 2019 16:13:43 - #devops #security