Netscout Systems announced the public availability of Cyber Threat Horizon, a free threat intelligence portal that offers network and security operators greater visibility into DDoS attacks in real-time. Cyber Threat Horizon collects, analyzes, prioritizes, and disseminates data on past and emerging DDoS threats across the internet. This macro view gives users contextual awareness of the DDoS attacks that could impact their organization.
Mellanox Technologies announced that it has reached a definitive agreement to acquire privately-held Titan IC Systems Limited, the leading developer of network intelligence and security technology to accelerate search and big data analytics across a broad range of applications in data centers worldwide. The acquisition will further strengthen Mellanox’s network intelligence capabilities.
Keyfactor announced at the RSA Conference its partnership and technology integration with SSL/TLS crypto-library provider wolfSSL. The integration provides greater security control to IoT (Internet of Things) device manufacturers at design and through a product’s lifetime. Recent research analyzed IoT device vulnerabilities, emphasizing inherent design constraints and limited entropy as critical factors contributing to IoT device security risks.
Johnson Controls announced that its Tyco Software House C•CURE 9000 v2.8 and Tyco American Dynamics victor 5.4.1 are the first platforms to be officially certified as meeting new third-party security standards from UL for on-premise commercial security systems. UL- 2610, which provides standards for Commercial Premises Security Alarm Units and Systems, updates the requirements for this technology to include cybersecurity provisions and cloud functionality.
Fujitsu Limited and Upstream Security Ltd., cutting-edge security solution provider for connected vehicles, today announced a partnership for vehicle cybersecurity. The companies will collaborate in the development of security operations solutions for connected vehicles. As more vehicles are connected to the network, they are increasingly prone to the growing risk of cyber-attacks.
Hanwha Techwin announced its top five key trend predictions for the security industry in 2020. They include: AI End-to-End Security Solutions, Cybersecurity, Cloud-based Data Insights, Privacy Protection and Vertical Specialized Solutions. In 2020, Hanwha Techwin will introduce cloud-based solutions beginning with the Device Health Monitoring Cloud which will monitor and manage video surveillance devices in real-time. The company will also introduce Retail Insight Cloud designed to facilitate store management.
The Amazon company Ring just issued a password reset after user logins were found online. Here is expert commentary from Peter Galvin, Chief Strategy Officer of nCipher Security. nCipher Security also has a list of safety tips for holiday shopping based on their recent survey of consumers in the U.S. and UK about their security perceptions related to connected devices and new technology. This survey gauged their overall levels of trust in various industries.
Outdated camera firmware, and failing to change default passwords present some of the biggest weaknesses in cybersecurity defence. As the number of interconnected security devices keeps on growing, keeping pace with the latest updates can be tricky and very time-consuming. According to new research* conducted by Genetec as many as 68.4%—or almost 7 out of 10—cameras are currently running out of date firmware.
Keyfactor announced the latest update to its award-winning PKI as-a-service and certificate lifecycle automation solution, Keyfactor Command. The offering supports information security, IT and DevOps teams juggling security priorities, regulatory demands and digital transformation. In a recent survey, 44 percent of security and IT professionals indicated that lack of skills and expertise is the greatest challenge they face in managing their organization’s PKI.
Siemplify announced its integration to the MITRE ATT&CK framework, enabling security operations teams to incorporate rich data and actionable intelligence into their incident response workflows. A globally accessible knowledge base of adversary tactics and techniques based on real-world observations, MITRE ATT&CK is used as a foundation for the development of specific threat models and methodologies in the private sector, government and in the cybersecurity product and service community.
According to PreciseSecurity.com, cloud security spending in the United States is expected to reach $1.93 billion by 2021. Back in 2016, the US region spent $675 million on cloud security solutions in total, meaning it will triple in the following years. In comparison with other regions, the United States also represents the leading cloud security spending region in the World, followed by the Asia Pacific with $638 million cloud security costs expected in 2021.
Nearly every industry has undergone some form of digital transformation, and security is no exception. More tech solutions hit the market every day and businesses are starting to see the importance of effectively combining their physical security and cybersecurity practices. The influx of IoT-enabled devices, coupled with an increase in cybercrime, has led businesses to take a hard look at preventative measures to protect their people, property and assets from threats.
Viakoo marks the end of National Cybersecurity Awareness Month with insights from three industries that are familiar with addressing cybersecurity challenges. Data centers have a unique position in today’s business landscape, enabling companies to quickly scale their computing and data processing resources. They also present a particularly attractive target for cybercriminals, because of the density of the valuable customer and business data they hold.
Infocyte introduced their “Response Ready” program for certified IR partners. These elite partners have deployed Infocyte into multiple customer environments during cybersecurity incident response operations and proven their ability to address and remediate active attacks. Additionally, Infocyte announced new platform Extensions enabling customers and partners to develop, deploy, and share custom collection and action capabilities built on top of Infocyte’s award-winning platform.
In September 2019, Proofpoint researchers observed a prolific threat actor, TA505, sending email campaigns that attempt to deliver and install Get2, a new downloader. Get2 was in turn observed downloading FlawedGrace, FlawedAmmyy, Snatch, and SDBbot (a new RAT) as secondary payloads. In this post, Proofpoint will detail the tactics, techniques, and procedures associated with these latest campaigns and provide a detailed analysis of Get2 downloader and SDBbot RAT.
The National Whistleblower Center has established a research partnership with the Center for Cybersecurity at Bradley University. Through this partnership, an academic research working group has been created to facilitate and promote enhanced whistleblower anonymity. Dr. Jacob Young, who has studied whistleblowing systems since 2013, has agreed to serve as the Senior Advisor on Cybersecurity for the National Whistleblower Center. In this role, he will manage and coordinate a multidisciplinary research team.
Qognify announced the latest release of its VMS Cayuga R14. In recent years, dealing with cybersecurity issues to safeguard video installations has become of utmost importance. One of the best ways to reduce network vulnerabilities associated with video surveillance systems is to make sure that the communication between the different components of the video solution is securely encrypted.
Lilu, also known as Lilocked, a new strain of ransomware, has now infected thousands of Linux servers since mid-July. Chris Gerritz, the co-founder of Infocyte, a pioneer in proactive threat detection and incident response, is available to comment on these attacks. Chris, the U.S. Air Force CERT’s former chief of defensive counter-cyber operations shares his notes.
Kingston Digital announced it will showcase an array of products at GSX 2019, the leading trade event for security professionals. Amid increasing concerns about data security, the company will showcase its full line of industry-leading encrypted USB Flash drive solutions, including the IronKey™ brand, high-density client and enterprise SSDs and Server Premier memory.
At this moment, cyber-attacks threaten thousands of vulnerable cargo ships, which carry billions of dollars’ worth of goods. Due to the lack of maritime-specific cybersecurity solutions, vessels are highly susceptible to digitally-led hijackings or even ransomware. This threat can wreak havoc on global shipping. With Artificial Intelligence functionality, future solutions include autonomous safety mechanisms which recognize that they are the sole line of defense.