Utimaco partners with ThothTrust to protect digital wallets and their cryptocurrency assets with Utimaco HSMs and the CryptoScript Software Development Kit (SDK). The Customizable Secure Cryptography (CSC) product offers different security levels and customization options to create a secure environment corresponding to the customer’s requirements. In the case of digital wallets, a Wallet Security Module (WSM) ensures cryptocurrency asset security based on a Utimaco HSM as its hardware root of trust. The Utimaco HSM equipped … More →
The post Utimaco HSM protects digital wallets and cryptocurrencies appeared first on Help Net Security.
Okta announced it has acquired ScaleFT. Together, Okta and ScaleFT will bring Zero Trust to the enterprise by providing organizations with a framework to protect data, without compromising on experience. As the proliferation of applications and devices continues, the network perimeter is disappearing and organizations must rethink how they secure their extended enterprises — employees, contractors and partners. Organizations of every size are realizing the criticality of moving to a Zero Trust framework by building … More →
The post Okta acquires ScaleFT to bring Zero Trust to the enterprise appeared first on Help Net Security.
Unitrends announced the new “Gen 8” release of its Recovery Series backup appliances. New efficiency built into the hardware appliances includes self-healing storage and disk density that stores more data in less space, saving up to 60 percent on power and cooling. The Recovery Series appliances also come pre-integrated with new Unitrends Backup version 10.2 software that optimizes cloud replication performance and features a redesigned Backup Catalog that reduces the time IT administrators spend on … More →
The post Unitrends Gen 8 includes self-healing storage and disk density appeared first on Help Net Security.
Cisco has issued another batch of fixes, plugging a number of critical and high severity holes in its Policy Suite, SD-WAN, and Nexus products. Cisco Policy Suite Users of the Cisco Policy Suite should upgrade to Release 18.2.0 as soon as possible, as it implements fixes for four critical vulnerabilities: A vulnerability (CVE-2018-0376) in the Policy Builder interface of the Suite that could be exploited by an unauthenticated, remote attacker to access the Policy Builder … More →
The post Cisco plugs serious flaws in Policy Suite, SD-WAN, and Nexus switches appeared first on Help Net Security.
Change Healthcare is providing healthcare leaders the keys to cloud security with Change Healthcare Security Management, which includes a “Bring Your Own Key” (BYOK) service now offered as part of the company’s cloud-based HealthQx value-based care analytics suite. “Hospitals, payers, and providers are under constant attack from a global network of cybercriminals using advanced and evasive techniques to penetrate networks, steal data, extort healthcare organizations, and capitalize on the personal health information of patients,” said … More →
The post Change Healthcare gives payers and providers the keys to cloud security appeared first on Help Net Security.
Aporeto announced its integration with Istio, the open source service mesh platform that connects, manages and secures microservices at scale. Istio’s service mesh is an open-source effort led by Google, IBM and Lyft that is designed to address the operational needs – observability, load-balancing and canary deployments – of deploying microservices at scale. Istio introduces security potential into containerized environments that are expensive and complex to develop from scratch, with the promise of enabling encryption … More →
The post Aporeto simplifies service mesh security operations with Istio integration appeared first on Help Net Security.
Pivot3 announced the release of its surveillance solution. Designed to support video surveillance and security deployments of 500TB or more, the platform provides the performance, resiliency, scalability and ease of use that is required for large scale environments. With this solution, Pivot3 is streamlining large scale video, security management and storage environments by hosting video management software, security applications and storage on a modular, scalable appliance. The solution can deliver more than 6PB of storage … More →
The post Pivot3 announces surveillance solution to support video deployments appeared first on Help Net Security.
The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, that malicious hacking activity would be increasingly targeted in this direction. It also stands to reason that the salient aspects of hacking – namely, remote access, … More →
Despite constant warnings by law enforcement and industry organizations, BEC scammers continue to fleece companies. They target small, medium, and large business and personal transactions, but have, in the last few years, shown a notable predilection for targeting companies in the real estate sector. What are BEC scams? Business E-mail Compromise (BEC)/E-mail Account Compromise (EAC) is a type of scam targeting both businesses and individuals performing wire transfer payments, and often starts with the attackers … More →
The post BEC scams and real estate deals: How to protect yourself? appeared first on Help Net Security.
Rapid7 integrates with Microsoft Azure to provide visibility, analytics, and automation for cloud security
Rapid7 announced integration between Rapid7’s Insight platform and Microsoft Azure. This integration provides vulnerability management, analytics-driven incident detection for hybrid environments, and agent deployment within the Azure infrastructure. Rapid7 customers utilizing Azure have, through InsightVM and InsightIDR, increased visibility into security vulnerability and attacks within their cloud and hybrid environments. Today’s security teams must work across IT and DevOps to maintain secure environments through orchestrated and automated processes that reduce risk while also limiting impact … More →
Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the past compared to 52% last year, exceeding the global average. U.S retail is also more inclined to store sensitive data in the cloud as widespread digital transformation is underway, yet only 26% report implementing encryption – trailing the global average. Year-over-year breach rate takes a turn for the … More →
Shape Security released its Credential Spill Report, shedding light on the extent to which the consumer banking, retail, airline and hospitality industries are impacted by credential stuffing attacks and account takeover. The report analyzes attacks that took place in 2017 and reveals 2.3 billion account credentials were compromised as a result of 51 independent credential spill incidents. Credential stuffing collectively costs U.S. businesses over $5 billion a year. When usernames and passwords are exposed, or … More →
The post Inside look at lifecycle of stolen credentials and extent of data breach damage appeared first on Help Net Security.
Coronet released a report identifying San Diego International Airport, John Wayne Airport-Orange County (CA) International Airport and Houston’s William P. Hobby International Airport as America’s most cyber insecure airports. The purpose of the report is to inform business travelers of how insecure airport Wi-Fi can inadvertently put the integrity and confidentiality of their essential cloud-based work apps (G-Suite, Dropbox, Office 365, etc.) at risk, and to educate all other flyers on the dangers of connecting … More →
The post Attention all passengers: Airport networks are putting you at risk! appeared first on Help Net Security.
Network Critical’s innovative SmartNA-PortPlus Network Packet Broker bridges the gap between todays ultra high speed networks and existing management, monitoring and security tools. The SmartNA-PortPlus provides up to 48 ports of 10/25Gbps plus 6 ports of 40/100Gbps in a non-blocking single RU chassis, enabling users to interconnect different network protection and monitoring tools quickly and easily. Beyond server ready high speed connectivity for security and monitoring tools, the SmartNA-PortPlus is also a feature rich traffic … More →
The post Video: Network Critical’s SmartNA-PortPlus Network Packet Broker appeared first on Help Net Security.
Red Hat announced the availability of Red Hat Ansible Engine 2.6, the latest release of its agentless open source IT automation solution. Red Hat Ansible Engine 2.6 adds new content for automating across hybrid and multicloud environments, along with simplified connections to network APIs and updates for Ansible deployments overseeing Windows environments. When Red Hat Ansible Engine 2.6 combines with Red Hat Ansible Tower, Red Hat’s centralized control plane for managing and optimizing automated systems … More →
The post Red Hat Ansible Engine 2.6 enables cloud, network, and Windows automation appeared first on Help Net Security.
Fugue announced it has hired Phillip Merrick as CEO. Merrick will drive strategy and lead the company’s operations across product, marketing and sales. Drawing on more than 20 years of experience growing enterprise software and SaaS companies, he will also lead Fugue’s efforts to educate the market about technology that changes the way enterprises address issues such as policy compliance and configuration drift in the cloud. As founder and CEO, Merrick took webMethods public in … More →
ThreatConnect announces new Playbooks enablements to optimize the ability to make faster security decisions, automate processes, and improve reaction and response capacity. “Our vision is a Platform that transforms the way that security professionals do their jobs,” CEO Adam Vincent said. “I’ve said this before…the only way to augment humans is to act like them. Humans use data to produce knowledge that becomes wisdom. That wisdom is the equivalent of our Intelligence and is what … More →
The post ThreatConnect enhances threat intelligence, analytics and orchestration capabilities appeared first on Help Net Security.
ManageEngine announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud. Log360 Cloud allows IT administrators to store and manage log data collected from on-premises environments on Zoho’s secure cloud platform, giving enterprises insight on aspects of their network without having to worry about storage infrastructure. According to Gartner, cloud-based SIEM deployments are expected to reach $512.1 million in 2019. “Small and midsize … More →
The post ManageEngine extends its SIEM solution log management capabilities to the cloud appeared first on Help Net Security.
Nehemiah Security announced upgrades to the EQ (Exploit Quantifier) platform. EQ tests the effectiveness of an organization’s endpoint configuration against malware and other attacks by leveraging cyberwarfare tools to characterize, model and predict attack outcomes in a customized, virtual environment. This configurable framework establishes scalable and repeatable testing to generate high-fidelity cyberattack intelligence. Security teams leverage this automated functionality to perform what-if scenarios, train security personnel, and strengthen their defensive posture. Security leaders must understand … More →
The post Nehemiah Security upgrades Exploit Quantifier platform appeared first on Help Net Security.
Armor announced that Mark Woodward has joined Armor’s leadership team as Chief Executive Officer (CEO). Armor founder and former CEO Chris Drake is stepping into the Chief Technology Officer (CTO) role as product strategist and evangelist and will continue as a member of the Board. “Armor is in a unique position to be the ‘definitive leader’ of cloud security, and I am very excited that Mark is joining Armor to help realize that vision,” said … More →