What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Blog.png 2019-09-20 08:40:15 MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns (lien direct)

Local government agencies remain acutely exposed to being hacked. That\'s long been true. However, at this moment in history, two particularly worrisome types of cyber attacks are cycling up and hitting local government entities hard: ransomware sieges and election tampering. Related: Free tools that can help protect elections I had a deep discussion about this […]

Ransomware
Blog.png 2019-09-19 21:47:33 MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity (lien direct)

A singular topic has risen to the top of the agenda in executive suites and board rooms all across the planet: cybersecurity. Related: Security, privacy fallout of IoT A recent survey by Infosys, a tech consulting and IT services giant based in Bangalore, India, quantifies the degree to which the spotlight has landed on cybersecurity […]

Blog.png 2019-09-19 15:29:03 MY TAKE: What everyone should know about the promise and pitfalls of the Internet of Things (lien direct)

The city of Portland, Ore. has set out to fully leverage the Internet of Things and emerge as a model “smart” city. Related: Coming soon – driverless cars Portland recently shelled out $1 million to launch its Traffic Sensor Safety Project, which tracks cyclists as they traverse the Rose City\'s innumerable bike paths. That\'s just […]

Blog.png 2019-09-16 15:30:18 SHARED INTEL: How digital certificates could supply secure identities for enterprise blockchains (lien direct)

Blockchain gave rise to Bitcoin. But blockchain is much more than just the mechanism behind the cryptocurrency speculation mania. Related: The case for ‘zero trust’ There\'s no disputing that blockchain technology holds the potential to massively disrupt business, politics and culture over the next couple of decades, much the way the Internet dramatically altered the […]

Blog.png 2019-09-11 13:59:04 NEW TECH: LogicHub introduces \'virtualized\' security analysts to help elevate SOAR (lien direct)

One of the promising cybersecurity trends that I\'ve been keeping an eye on is this: SOAR continues to steadily mature. Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. Related: Here’s how Capital One lost 100 million customer records SOAR holds […]

Blog.png 2019-09-10 15:53:04 NEW TECH: Baffin Bay Networks takes a \'cloud-first\' approach to securing web applications (lien direct)

Hear about the smart toaster that got attacked three times within an hour after its IP address first appeared on the Internet? That experiment conducted by a reporter for The Atlantic crystalizes the seemingly intractable security challenge businesses face today. Related: How 5G will escalate DDoS attacks Caught in the pull of digital transformation, companies […]

Blog.png 2019-09-06 16:56:00 MY TAKE: How advanced automation of threat intel sharing has quickened incident response (lien direct)

Threat intelligence sharing is such a simple concept that holds so much promise for stopping threat actors in their tracks. So why hasn\'t it made more of an impact stopping network breaches? Related: Ground zero for cybersecurity research Having covered the cybersecurity industry for the past 15 years, it\'s clear to me that there are […]

Threat
Blog.png 2019-09-04 19:58:04 SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated (lien direct)

The convergence of DevOps and SecOps is steadily gaining traction in the global marketplace. Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Related: The tie between DevOps and SecOps. Organizations that are all-in leveraging microservices to speed-up application development, on the DevOps side of the […]

Blog.png 2019-08-29 18:54:03 MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools (lien direct)

Europe came down hard this summer on British Airways and Marriott for failing to safeguard their customers\' personal data. The EU slammed the UK airline with a $230 million fine, and then hammered the US hotel chain with a $125 million penalty – the first major fines under the EU\'s toughened General Data Protection Regulation, […]

Blog.png 2019-08-26 15:26:04 (Déjà vu) NEW TECH: ICS zero-day flaws uncovered by Nozomi Networks\' analysis of anomalous behaviors (lien direct)

Andrea Carcano\'s journey to co-founding a security company in the vanguard of defending critical infrastructure began at a tender age. Related: Why the Golden Age of cyber spying is here Carcano hacked a computer screen at age 14, and that got him intrigued by software controls. He went on to earn a masters degree in cybersecurity, […]

Blog.png 2019-08-26 14:40:04 NEW TECH: Nozomi Networks tracks anomalous behaviors, finds zero-day ICS vulnerabilities (lien direct)

Andrea Carcano\'s journey to co-founding a security company in the vanguard of defending critical infrastructure began at a tender age. Related: Why the Golden Age of cyber spying is here Carcano hacked a computer screen at age 14, and that got him intrigued by software controls. He went on to earn a masters degree in cybersecurity, […]

Blog.png 2019-08-22 17:11:00 MY TAKE: Coping with security risks, compliance issues spun up by \'digital transformation\' (lien direct)

A core security challenge confronts just about every company today. Related: Can serverless computing plus GitOps lock down DX? Companies are being compelled to embrace digital transformation, or DX, if for no other reason than the fear of being left behind as competitors leverage microservices, containers and cloud infrastructure to spin-up software innovation at high […]

Blog.png 2019-08-22 13:42:04 GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right (lien direct)

It ought to be clear to everyone that personal privacy should be a human right and not a commodity to be bought and sold. Alas, we can\'t take it for granted: data breaches put us under fire constantly, revealing everything about us from logs and passwords to medical data. The recent Suprema data breach, for […]

Blog.png 2019-08-21 08:57:00 MY TAKE: Here\'s how \'bulletproof proxies\' help criminals put compromised IoT devices to work (lien direct)

Between Q1 2019 and Q2 2019, malicious communications emanating from residential IP addresses in the U.S. – namely smart refrigerators, garage doors, home routers and the like – nearly quadrupled for the retail and financial services sectors. Related: How botnets gave Trump 6 million faked followers To put it plainly, this represented a spike in […]

Blog.png 2019-08-20 09:43:05 SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm\'s way (lien direct)

A faked Rolex or Prada handbag is easy enough to acquire on the street in certain cities, and you can certainly hunt one down online. Now add high-end counterfeit smartphones to the list of luxury consumer items that are being aggressively marketed to bargain-hungry consumers. Related: Most companies ignorant about rising mobile attacks While it […]

Blog.png 2019-08-19 08:59:05 MY TAKE: Can embedding security deep inside mobile apps point the way to securing IoT? (lien direct)

The full blossoming of the Internet of Things is on the near horizon – or is it? Enterprises across the planet are revving up their IoT business models, and yet there is a sense of foreboding about a rising wave of IoT-related security exposures. Related: The security and privacy implications of driverless vehicles Some 25 percent […]

Blog.png 2019-08-15 13:24:04 MY TAKE: A primer on how ransomware arose to the become an enduring scourge (lien direct)

“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” This is an excerpt from a chilling ransom note Baltimore IT officials received from hackers who managed to lock up most of the city\'s servers in May. The attackers demanded $76,000, paid in Bitcoin, for a decryption key. Baltimore refused to pay […]

Ransomware
Blog.png 2019-08-14 12:40:05 NEW TECH: Trend Micro inserts \'X\' factor into \'EDR\' – endpoint detection and response (lien direct)

With all the talk of escalating cyber warfare, the spread of counterfeit smartphones and new forms of self-replicating malware, I came away from Black Hat USA 2019 (my 15th) marveling, once more, at the panache of modern cyber criminals. Related: Lessons learned from Capital One breach Yet, I also had the chance to speak one-on-one […]

Blog.png 2019-08-12 13:00:01 GUEST ESSAY: Why the next round of cyber attacks could put many SMBs out of business (lien direct)

In the last year, the news media has been full of stories about vicious cyber breaches on municipal governments.  From Atlanta to Baltimore to school districts in Louisiana, cyber criminals have launched a wave of ransomware attacks on governments across the country. Related: SMBs struggle to mitigate cyber attacks As city governments struggle to recover […]

Ransomware
Blog.png 2019-08-01 08:40:05 ROUNDTABLE: Huge Capital One breach shows too little is being done to preserve data privacy (lien direct)

Company officials at Capital One Financial Corp ought to have a crystal clear idea of what to expect next — after admitting to have allowed a gargantuan data breach. Capital One\'s mea culpa coincided with the FBI\'s early morning raid of a Seattle residence to arrest Paige Thompson. Authorities charged the 33-year-old former Amazon software […]

Blog.png 2019-07-25 22:32:01 MY TAKE: How state-backed cyber ops have placed the world in a constant-state \'Cyber Pearl Harbor\' (lien direct)

Cyber espionage turned a corner this spring when Israeli fighter jets eradicated a building in the Gaza Strip believed to house Hamas cyber operatives carrying out attacks on Israel\'s digital systems. Related: The Golden Age of cyber spying is upon us. That May 10th  air strike by the Israel Defense Force marked the first use […]

Blog.png 2019-07-22 08:29:02 NEW TECH: Early adopters find smart \'Zero Trust\' access improves security without stifling innovation (lien direct)

As we approach the close of the second decade of the 21st century, it\'s stunning, though perhaps not terribly surprising, that abused logon credentials continue to fuel the never-ending escalation of cyber attacks. Related: Third-party risks exacerbated by the ‘gig economy’ Dare we anticipate a slowing — and ultimately the reversal – of this trend? […]

Blog.png 2019-07-15 12:19:02 GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business (lien direct)

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that a cyber-attack costs your organization, you would be wrong. In fact, a recent academic analysis identified 57 specific individual negative factors that result from a cyber-attack against a business. Here are six ways, worth considering, […]

Blog.png 2019-07-01 19:13:04 NEW TECH: A couple of tools that deserve wide use - to preserve the integrity of U.S. elections (lien direct)

As the presidential debate season ramps up, the specter of nation-state sponsored hackers wreaking havoc, once more, with U.S. elections, looms all too large. It\'s easy to get discouraged by developments such as  Sen. McConnell recently blocking a bi-partisan bill to fund better election security, as well as the disclosure that his wife, Transportation Security […]

Blog.png 2019-06-26 08:43:01 MY TAKE: Let\'s not lose sight of why Iran is pushing back with military, cyber strikes (lien direct)

It is not often that I hear details about the cyber ops capabilities of the USA or UK discussed at the cybersecurity conferences I attend. Related: We’re in the golden age of cyber spying Despite the hush-hush nature of Western cyber ops, it is axiomatic in technology and intelligence circles that the USA and UK […]

Blog.png 2019-06-24 16:27:02 BEST PRACTICES: Do you know the last time you were socially engineered? (lien direct)

This spring marked the 20th anniversary of the Melissa email virus, which spread around the globe, setting the stage for social engineering to become what it is today. The Melissa malware arrived embedded in a Word doc attached to an email message that enticingly asserted, “Here\'s the document you requested . . . don\'t show […]

Malware
Blog.png 2019-06-10 08:49:05 MY TAKE: Why locking down \'firmware\' has now become the next big cybersecurity challenge (lien direct)

Locking down firmware. This is fast becoming a profound new security challenge for all companies – one that can\'t be pushed to a side burner. Related: The rise of ‘memory attacks’ I\'m making this assertion as federal authorities have just commenced steps to remove and replace switching gear supplied, on the cheap, to smaller U.S. […]

Blog.png 2019-06-04 15:12:05 GUEST ESSAY: The story behind how DataTribe is helping to seed \'Cybersecurity Valley\' in Maryland (lien direct)

There\'s oil in the state of Maryland – “cyber oil.” With the largest concentration of cybersecurity expertise –– the “oil” — in the world, Maryland is fast changing from the Old Line State into “Cybersecurity Valley.” Related: Port Covington cyber hub project gets underway That\'s because Maryland is home to more than 40 government agencies […]

Blog.png 2019-05-28 08:26:05 GUEST ESSAY: Only cloud-based security can truly protect cloud-delivered web applications (lien direct)

Web applications have become central for the existence and growth of any business. This is partly the result of Software as a Service, or SaaS, becoming a preferred mode of consumption for software services. Related: AppTrana free trial offer Most companies today own a web application and if that application is an integral part of […]

Blog.png 2019-05-22 16:08:03 GUEST ESSAY: Dear America, Facebook is an addictive digital drug of little productive value (lien direct)

Social media consumers are getting wise to the joke that when the product is free, they\'re the ones being sold. But despite the growing threat of consumer exploitation, Washington still shrinks from confronting our social media giants. Why? Because the social giants have convinced the chattering class that America simply can\'t do without them. Confront […]

Threat
Blog.png 2019-05-20 19:26:00 MY TAKE: Android users beware: Google says \'potentially harmful apps\' on the rise (lien direct)

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Where would we be without them? Related Q&A: Diligence required of Android users If you\'re anything like me, making a phone call is the fifth or sixth reason to reach for your Android or iPhone. Whichever OS you […]

Blog.png 2019-05-14 13:47:03 BEST PRACTICES: The case for \'adaptive MFA\' in our perimeter-less digital environment (lien direct)

One of the catch phrases I overheard at RSA 2019 that jumped out at me was this: “The internet is the new corporate network.” Related: ‘Machine identities’ now readily available in the Dark Net Think about how far we\'ve come since 1999, when the Y2K scare alarmed many, until today, with hybrid cloud networks the […]

Blog.png 2019-05-10 19:30:04 GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain (lien direct)

The recent network breach of Wipro, a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity. However, the flip side is that […]

Blog.png 2019-05-08 13:14:04 Q&A: Here\'s why Android users must remain vigilant about malicious apps, more so than ever (lien direct)

Android users – and I\'m one – are well-advised to be constantly vigilant about the types of cyberthreats directed, at any given time, at the world\'s most popular mobile device operating system. Related: Vanquishing BYOD risks Attacks won\'t relent anytime soon, and awareness will help you avoid becoming a victim. It\'s well worth it to […]

Blog.png 2019-05-08 08:28:05 NEW TECH: DataLocker extends products, services to encrypt data on portable storage devices (lien direct)

No matter how reliant we ultimately become on cloud storage and streaming media, it\'s hard to image consumers ever fully abandoning removable storage devices. There\'s just something about putting your own two hands on a physical device, whether it\'s magnetic tape, or a floppy disk, or a CD. Today, it\'s more likely to be an […]

Blog.png 2019-05-07 08:19:04 NEW TECH: SlashNext dynamically inspects web page contents to detect latest phishing attacks (lien direct)

Humans are fallible. Cyber criminals get this. Human fallibility is the reason social engineering has proven to be so effective – and why phishing persists. Consider these metrics from messaging security firm Proofpoint: •Email-based corporate credential phishing attacks quadrupled in Q3 2018 vs. the previous quarter. •Web-based social engineering attacks jumped 233% vs. the previous […]

Blog.png 2019-05-06 13:40:04 Q&A: The drivers behind the stark rise - and security implications - of \'memory attacks\' (lien direct)

A distinctive class of hacking is rising to the fore and is being leveraged by threat actors to carry out deep, highly resilient intrusions of well-defended company networks. Related: Memory hacking becomes a go-to tactic These attacks are referred to in the security community as “fileless attacks” or “memory attacks.” The latter conveys a more […]

Threat
Blog.png 2019-05-03 06:05:02 GUEST ESSAY: Six risks tied to social media marketing that all businesses should heed (lien direct)

While the internet and social media have been very positive for businesses, there remains an inherent risk when it comes to how brands manage their Facebook, Twitter, and Instagram accounts. Related: Defusing weaponized documents While social media on every platform has benefits, there remains risks that must be addressed so as to keep your companies\' […]

Blog.png 2019-05-02 08:44:03 MY TAKE: \'Cyberthreat index\' shows SMBs recognize cyber risks - struggling to deal with them (lien direct)

Small and midsize businesses - so-called SMBs - face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. Related: ‘Malvertising’ threat explained However, one small positive step is that […]

Threat
Blog.png 2019-05-01 09:11:04 BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered (lien direct)

Defending a company network is a dynamic, multi-faceted challenge that continues to rise in complexity, year after year after year. Related: Why diversity in training is a good thing. Yet there is a single point of failure common to just about all network break-ins: humans. Social engineering, especially phishing, continues to trigger the vast majority […]

Blog.png 2019-04-30 08:59:05 MY TAKE: NIST Cybersecurity Framework has become a cornerstone for securing networks (lien direct)

If your company is participating in the global supply chain, either as a first-party purchaser of goods and services from other organizations, or as a third-party supplier, sooner or later you\'ll encounter the NIST Cybersecurity Framework. Related: How NIST protocols fit SMBs The essence of the NIST CSF is showing up in the privacy regulations […]

Blog.png 2019-04-29 09:11:01 NEW TECH: How Semperis came to close a huge gap in Active Directory disaster preparedness (lien direct)

In today\'s complex IT environments, a million things can go wrong, though only a few systems touch everything. Related: Why Active Directory is so heavily targeted For companies running Microsoft Windows, one such touch-all systems is Active Directory, or AD, the software that organizes and provides access to information across the breadth of Windows systems. […]

Blog.png 2019-04-24 14:50:04 MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks (lien direct)

Accounting for third-party risks is now mandated by regulations — with teeth. Related: Free ‘VRMM’ tool measures third-party exposure Just take a look at Europe\'s GDPR, NYDFS\'s cybersecurity requirements or even California\'s newly minted Consumer Privacy Act. What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the […]

Tool
Blog.png 2019-04-23 20:52:04 NEW TECH: Alcide introduces a “microservices firewall” as a dynamic \'IaaS\' market takes shape (lien direct)

As a tech reporter at USA TODAY, I wrote stories about how Google fractured Microsoft\'s Office monopoly, and then how Google clawed ahead of Apple to dominate the global smartphone market. Related: A path to fruition of ‘SecOps’ And now for Act 3, Google has thrown down the gauntlet at Amazon, challenging the dominant position […]

Blog.png 2019-04-22 18:12:02 NEW TECH: Circadence deploys \'gamification\' training to shrink cybersecurity skills gap (lien direct)

It\'s clear that closing the cybersecurity skills gap has to happen in order to make our internet-centric world as private and secure as it ought to be. Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence®. The Boulder, CO-based company got its start in the […]

Blog.png 2019-04-18 22:19:00 MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices (lien direct)

A dozen years after Apple launched the first iPhone, igniting the smartphone market, the Bring Your Own Device to work phenomenon is alive and well. Related: Stopping mobile device exploits. The security issues posed by BYOD are as complex and difficult to address as ever. Meanwhile, the pressure for companies to proactively address mobile security […]

Blog.png 2019-04-18 08:46:03 NEW TECH: Brinqa takes a \'graph database\' approach to vulnerability management, app security (lien direct)

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market Enterprises, especially, tend to be methodical and plodding. Digital transformation is all about high-velocity innovation and on-the-fly change. The yawning gap between […]

Vulnerability
Blog.png 2019-04-17 18:11:01 Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities (lien direct)

It\'s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey in the U.K. recently teamed up and found evidence of an emerging market for stolen and spoofed […]

Blog.png 2019-04-16 09:04:03 Q&A: How AI, digital transformation are shaking up revenue management in high tech, life sciences (lien direct)

A recent poll of some 300 senior executives from U.S.-based life sciences and high-tech manufacturing companies sheds light on how digital transformation – and the rising role of third-party partners – have combined to create unprecedented operational challenges in the brave new world of digital commerce. Related: AI one-upsmanship prevails in antivirus field Model N\'s […]

Blog.png 2019-04-12 15:46:03 Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools (lien direct)

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The best practices standards and protocols to pull off this delicate balancing act have been thoroughly vetted and are readily available. And there\'s certainly […]

1 2 3 4 5 6 7

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter