Cyber Security

Dunbar Releases First Open Source Active Response Platform For Cybersecurity

To address the security risks caused by alert fatigue, and to extend enterprise-grade incident management capabilities to businesses of all sizes, Dunbar Security Solutions launched Cyphon, the industry’s first open source active response platform for collecting data, identifying cyber-attacks and tracking all subsequent work performed.

Ransomware Cyber-Attack A Wake-Up Call, Microsoft Warns

Cyber-attacks that have hit 150 countries since Friday should be treated by governments around the world as a “wake-up call,” Microsoft says. The computing giant said software vulnerabilities hoarded by governments have caused “widespread damage.” The latest virus exploits a flaw in Microsoft Windows first identified by US intelligence. There are fears of further “ransomware” […]

Computer Security Experts Fear Second Wave Of ‘Biggest Ransomware Attack Ever’

The malicious “ransomware” attacks that seized computers worldwide Friday and held those systems hostage are likely to worsen this week as millions of people return to work – forcing them to discover the hard way whether they have been affected, security analysts said. With much of the world still reeling from the digital breach that prevented people from receiving hospital care, a second wave of what European officials have called “the biggest ransomware attack ever” could be devastating.

Biggest Cybersecurity Threat Facing Federal Agencies Is legacy IT

Improving our cyber posture is among the top priorities for the Trump administration. However, there are still many questions raised as to how they hope to achieve this goal. As we have seen over the past several years, high-profile hacks are practically the norm. Starting with the OPM data breach in 2015, which affected millions of current and former federal employees to Russia’s efforts to influence our election through hacking of our political parties, cyberattacks have become a constant source of news and frustration in our lives.

2017 Global Threat Intelligence Report: 77% Of All Ransomware Detected In Four Industries

NTT Security, the specialized security company of NTT Group, has launched its 2017 Global Threat Intelligence Report (GTIR), which analyzes global threat trends based on log, event, attack, incident and vulnerability data [1 October 2015 to 31 September 2016]. Analyzing content from NTT Group operating companies, including NTT Security, Dimension Data, NTT Communications, NTT Data, and data from the Global Threat Intelligence Center (formerly known as SERT), the report highlights the latest ransomware, phishing and DDoS attack trends and demonstrates the impact of today’s threats against global organizations.

Taking Cybersecurity A Step Further With Attribute-Based Access Control

Most organizations already have firewalls implemented, encrypted critical data assets, and monitor network activity as part of an overall cybersecurity plan, but there is another line of defense that can provide additional value: the use of attribute based access control (ABAC) to reduce the threat surface, thereby improving overall security as well as mitigating risks associated with breaches.

Digital Defense Receives IBM PartnerWorld’s Ready For IBM Security Intelligence Validation

Digital Defense, a leading provider of Vulnerability Management as a Service (VMaaS), announced it has received IBM PartnerWorld’s Ready for IBM Security Intelligence designation for its Frontline™ Vulnerability Manager. As a result, Digital Defense’s Frontline Vulnerability Manager has been validated to integrate with IBM Security products to help better protect customers around the world.

Hacking Institutes Of Higher Learning

Due to the fact that Universities and Institutes for Higher Learning have large amounts of legacy financial and health records, grant computer privileges to students with traditionally a lax security mindset, and house valuable research data hackers have taken notice. This is why higher education has become the second most targeted industry after Healthcare. Based on how stolen data can be monetized, various types of hackers have become interested for different reasons. In some cases, it has been nation-state actors that are more interested in the research data such as with the recent case of the Russian hacker known as Rasputin. In other cases, it has been an individual who was able to change passwords of email accounts or a disenfranchised student assistant who was terminated but maintained access to the system.

ASIS Lends Support To MAIN STREET Cybersecurity Act

ASIS International (ASIS), the leading association for security management professionals worldwide, today sent a letter of support to the Senate Committee on Commerce, Science, and Transportation for the Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology (MAIN STREET) Cybersecurity Act. The proposed legislation calls on the National Institute of Standards and Technology (NIST) and other agencies to provide a consistent set of resources for small businesses to best protect their digital assets from cybersecurity threats.

Tyco Security Products Adds Cybersecurity Features And Improved User Experience to exacqVision 8.4

Tyco Security Products, part of Johnson Controls, introduces the latest release of the exacqVision VMS (8.4) which adds critical cybersecurity features demanded by IT departments while enhancing the user experience. exacqVision now supports HTTPS communication between the NVR and some of the industry’s leading cameras, adding a new layer of protection to security deployments. Users can also easily acquire and configure security certificates used by exacqVision Web Services for HTTPS communication, ensuring all communication to web browsers and Exacq Mobile is encrypted.