Cyber Security

How To Avoid VPN Deception?

The abuse of consumer data is nothing new. With ongoing revelations that data collected by social media networks and search engine services has been breached by hackers or sold to third parties, people have become weary of the trustworthiness of companies to protect their data from being misused or sold to third parties. Acquiring user data has become incredibly lucrative, and analysts forecast that the big data analytics market will exceed $200 billion by 2020.

The Latest Advanced IT Security Product Will Help Organizations Drastically Reduce The Risks Of Cyber-Attacks

Reflare LTD launched a new product – Reflare Certified Secure Employee (RCSE). This new product is tailored specifically for organizations who need to upskill non-tech staff in the actions and behaviors that reduce the risks of cyber-attacks and security breaches. RCSE joins the Reflare Certified Secure Developer (RCSD) and Reflare Certified Secure Administrator (RCSA) products to create one of the most advanced IT security training offerings on the market today.

WatchGuard Warns Of Vaporworms, Global Internet Disruption And Rogue AI Chatbots For 2019

WatchGuard Technologies information security predictions for 2019 include the emergence of ?vaporworms?, a new breed of fileless malware with wormlike properties to self-propagate through vulnerable systems, along with a takedown of the internet itself and ransomware targeting utilities and industrial control systems. WatchGuard?s Threat Lab research team developed these predictions based on an analysis of major security and threat trends over the past year.

Secure Channels Launches SCIFCOM Featuring Four New Security Services

Secure Channels announced the launch of SCIFCOM (Secure Containment Information Facility) an as-a-service portal that features the strongest non-military encryption technology currently available to the public. SCIFCOM delivers four new security services that include features for ultra-encrypting and transmitting large files, as well as a plug-in for Microsoft Office 365 that enables users to send and receive encrypted (“XFA E-Mail”) with complete privacy and the familiarity of standard MS Outlook email.

The Four Biggest Risks Of Physical Data Security

Edward Snowden?s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He?s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there?s one way to categorize him that no one can dispute: He?s a thief. There?s no doubt about it: Snowden?s information didn?t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again.

Five Measures To Keep Your Company’s Emails Protected

It?s hard to nail down the real damage that a single data breach can cost your company. We?ve all read about business giants like Uber and Facebook experiencing massive data breaches that exposed the personal information of millions of users?resulting in months of negative press, steep drops in stock value, and loss of consumer trust. And while the above become a wake-up call to customers and business owners alike on the value of protecting online accounts, the same discourse hasn?t occurred around secure emails.

New Global Research Shows That Digital Transformation Heightens Risk Of Costly Cyberattacks

ESI ThoughtLab has partnered with the Wall Street Journal, the Security Industry Association and other industry coalition members to release cybersecurity analysis and benchmarks covering 1,300 companies. A comprehensive study about cybersecurity from leading research firm ESI ThoughtLab, together with research partner the Wall Street Journal?s WSJ Pro Cybersecurity and a cross-industry coalition shows that digital transformation is exposing companies to higher and more costly cyber risks.

IIS Attacks Increase From 2K To 1.7M Over Last Quarter According To Threat Report

IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider, IIS attacks showed a 782x increase, from 2,000 to 1.7 million, since last quarter. Analysis of the attacks by eSentire Threat Intelligence revealed that both IIS and WebLogic exploits maintained a consistent number of attacks (about 200) per IP across organizations, with those attacks originating from servers hosting Apache, RDP, SQL, IIS, and HTTP API services.

Cymulate Announces Technology Integration With Tenable

Cymulate?s BAS platform enables organizations to launch simulations of multi-vector cyberattacks against their networks, immediately exposing vulnerabilities and providing remediation steps. This integration enables security teams to seamlessly view Tenable.io data from within Cymulate?s platform. This allows for improved insight into current exposures and risks, vulnerabilities and infiltration patterns within the corporate network to provide a more comprehensive view of the organization?s cybersecurity posture.

3xLOGIC Introduces Lite Version Of VIGIL Client For Mac Users

3xLOGIC announced immediate availability for the company?s new VIGIL Client Lite software for Mac users. 3xLOGIC?s newest software offering fulfills customer requests to produce a lite version of VIGIL Client for Mac users that provides the basic functionality of the PC version of VIGIL Client. Running VIGIL Client Lite natively on the Mac OS should be a significant performance boost.

Viakoo Demonstrates Physical Security Compliance Solutions At GSX 2018

Viakoo demonstrates solutions to assist in proving and maintaining regulatory or organizational compliance at GSX 2018. The dynamic capabilities of this system help customers ensure—and prove—consistent compliance with physical security regulations across a wide range of applicable industries including: transportation, payment card processing (PCI), electrical distribution and many more. This solves a persistent challenge in these industries to help avoid the risk of fines or service interruptions.

Viakoo Highlights Breakthrough Solutions At GSX 2018

Viakoo demonstrated innovative new offerings for physical security service assurance and sustainable cyber hygiene at GSX 2018. Viakoo is showcased two of their newest software solutions for the intersection of physical and cyber security: the new Camera Firmware Update Manager (CFUM), and the new IoT Tracker. Viakoo helps to automate the process of assuring that video surveillance is working as it should, providing an auditable record.

Axis Communication Receives Innovation Product Award At GSX 2018

Axis Communications was honored with an Innovative Product Award for its AXIS Device Manager at the 2018 GSX. The on-premise tool delivers an easy, cost-effective and secure way for security system installers and administrators to manage a couple thousand Axis network cameras, access control and audio devices on one site – or several thousand devices across multiple sites. A staple of cybersecurity management, AXIS Device Manager can manage cybersecurity controls on Axis devices by managing HTTPS and upload IEEE 802.1x certificates, accounts and passwords.

LEC-6041: The Next Generation Industrial Cyber Security Platform

IIoT infrastructure has encountered increasing cyber security threats due to the vulnerability by the use of public networks for IT/OT convergence. This has exposed exploitable opportunities for hackers. To add confidence in industrial control system (ICS), Lanner presents LEC-6041, the next-generation industrial cyber security gateway. Lanner?s LEC-6041, being the successor of LEC-6021, is designed to protect the communication in both IT and OT domains. LEC-6041 Series is empowered by Intel Atom x7-E3950 or x5-E3930 for low power consumption and high processing performance.

OnSSI Offers Informative System Hardening Guidebook To Help Enterprises Mitigate Cyber Attacks

OnSSI is offering a free highly-informative guidebook entitled, ?Hardening Guide for Networked Video Surveillance Systems“, to help enterprises protect their systems from potential cybersecurity threats. The free downloadable guide provides specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. The OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates.

WatchGuard Unveils Trusted Wireless Environment Framework

WatchGuard® Technologies launched its new Trusted Wireless Environment framework, a guiding resource businesses and solution providers can use to build Wi-Fi services that offer market-leading performance, scalable management and verified, comprehensive security capabilities. This new initiative seeks to upset the status quo in the wireless market, which has prioritized performance over security for far too long.

Ava Group Selected To Safeguard The Indian Ministry Of Defence Closed Data Network

AVA group announced that an Ava Group Company solution has been selected to protect a major military closed data network from the threat of tampering and tapping. The project to deploy its fibre optic intrusion detection and location solution is valued at around US$11m and asserts Ava Group?s status as a world leader in data network protection. The principal task of this project supports The Ministry of Defence in India, who has the responsibility to protect its closed user group data network which is one of the largest in the world and used by more than one million military personnel.

Lenel?s OnGuard Version 7.5 Delivers Powerful Enhancements

Lenel offers an extensive set of new features and utilities with the introduction of OnGuard?version 7.5. The enhanced OnGuard 7.5 access control solution deepens Lenel?s focus on unification, mobility, cybersecurity and cloud compatibility with platform updates, including enriched browser clients and a next-generation visitor management suite ?– all adding to its already substantial capabilities. Lenel is part of UTC Climate, Controls & Security, a unit of United Technologies Corp.

New Security Research Reveals Password Inadequacy A Top Threat

WatchGuard® Q2 2018 Internet Security Report uncovers cybercriminals? heightened use of credential-focused attacks, the continued prevalence of malicious Office documents, and more. WatchGuard Technologies announced the findings of its Internet Security Report for Q2 2018, which explores the latest security threats affecting small to midsize businesses (SMBs) and distributed enterprises. The new research from the WatchGuard Threat Lab revealed that 50 percent of government and military employee LinkedIn passwords were weak enough to be cracked in less than two days.

Twistlock Labs Uncovers Widespread Zero Touch Attacks Against Cloud Native Applications

Twistlock released its first biannual state of cloud-native security report, entitled Watching the Honeypots. Over 25 percent of Cloud Native Applications Vulnerable to Exploit; Over 90 percent of Attacks Automated. In this report, Twistlock Labs researchers analyzed deployments of common cloud native applications and ran honeypots to collect data on risk factors and attack patterns against cloud native services.