The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
The Guardian recently broke the news that the accounting firm Deloitte was hit last year by a cyber attack that exposed the confidential emails and plans of at least six of its clients. The attackers gained access to Deloitte’s systems in October or November of 2016, the report states, but the company didn’t discover the…
EiQ Networks now has millions of dollars in fresh capital and a new name, Cygilant. The firm announced on Sept. 19 that it had raised $7 million in an investment round headed by Arrowroot Capital. To date, the company has raised $38 million. Cygilant plans to use the funds to hire more security engineers to…
A Baird Equity Research report [PDF] blamed the recent Equifax breach that exposed 143 million consumers’ personal information on a security flaw in the open source Apache Struts framework, which is used to build Java Web applications. Contrast Security co-founder and CTO Jeff Williams noted in a blog post that the Struts vulnerability in question…
The SANS Institute has updated its Phishing Training solution, offering organizations new tools that help them determine how susceptible their workforces are to phishing attacks. SANS Phishing Training now features email templates that are updated on a regular basis, ensuring that security awareness professionals can keep up with the latest tactics used by scammers. It…
While only 38 percent of large organizations don’t use multi-factor authentication to protect user accounts, 62 percent of small to mid-sized organizations do not use MFA, a recent KnowBe4 survey of 2,600 IT professionals found. Similarly, almost 97 percent of large organizations have an enforced password policy, compared to just under 88 percent of small…
Cybersecurity firm AlienVault today took the wraps off a new AlienApp for its USM (Unified Security Management) Anywhere platform that alerts organizations to the presence of stolen credentials on the dark web. The company’s appropriately-named AlienApp for Dark Web Monitoring solution seeks out all the email addresses associated to a given domain. Additionally, users can…
LAS VEGAS — The concept of Red and Blue security team testing is one that is well understood among many security professionals. The Red Team takes an offensive penetration testing approach to security aiming to expose risks, while the Blue Team is tasked with defending against attackers. Justin Harvey, global lead for the Accenture Security’s…
International health insurance provider Bupa Global recently acknowledged that an employee had inappropriately accessed and removed information on 108,000 health insurance policies covering a total of 547,000 current and former customers. The exposed data includes names, birthdates, nationalities, contact details, and administrative information including Bupa membership numbers. “This was not a cyber attack or external…
Earlier this week, Ukrainian police seized servers belonging to accounting software provider Intellect Service as part of an investigation into last month’s massive NotPetya ransomware attack, which hit the country’s government, transport systems, banks and power utilities. Intellect Service’s M.E.Doc accounting software is used by about 80 percent of companies in the Ukraine, according to…
At the recent Gartner Security & Risk Management Summit 2017, company analysts predicted that the following 11 technologies will be the top solutions in information security in the coming year: 1. Cloud Workload Protection Platforms (CWPPs) provide information security leaders with an integrated way to protect cloud workloads using a single management console and…